google / osdfir-infrastructure
Helm charts for running open source digital forensic tools in Kubernetes
☆79Updated 3 weeks ago
Alternatives and similar repositories for osdfir-infrastructure:
Users that are interested in osdfir-infrastructure are comparing it to the libraries listed below
- DFIQ is a collection of investigative questions and the approaches for answering them☆266Updated 4 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆43Updated this week
- The Sigma command line interface based on pySigma☆141Updated 2 weeks ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆153Updated last month
- ☆86Updated 4 months ago
- A tool that allows you to document and assess any security automation in your SOC☆43Updated 2 months ago
- Anvilogic Forge☆88Updated last week
- ☆39Updated this week
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated 7 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆42Updated 2 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆72Updated this week
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆100Updated 3 months ago
- An open source platform to support analysts to organise their case and tasks☆64Updated this week
- ☆27Updated 3 years ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆184Updated 4 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆52Updated last year
- LOKI2 - Simple IOC and YARA Scanner☆84Updated 5 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆167Updated 4 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆51Updated 2 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆59Updated 8 months ago
- OSSEM Data Dictionaries☆59Updated 4 months ago
- ☆69Updated 10 months ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆98Updated 3 months ago
- Rules generated from our investigations.☆188Updated 2 months ago
- HASH (HTTP Agnostic Software Honeypot)☆133Updated 8 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆34Updated last month
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 10 months ago
- A repository of my own Sigma detection rules.☆156Updated 4 months ago