halpomeranz / linewatchLinks
☆18Updated 10 years ago
Alternatives and similar repositories for linewatch
Users that are interested in linewatch are comparing it to the libraries listed below
Sorting:
- InvestigationPlaybookSpec☆72Updated 8 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆51Updated 7 years ago
- ☆39Updated 6 years ago
- Tools to search through massive amounts of data☆21Updated 2 months ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- Various tools and scripts☆43Updated 3 years ago
- Example programs used in the automating DFIR series☆63Updated 6 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆22Updated 7 years ago
- Different DFIR and CTI utilities☆37Updated 5 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 10 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Volatility plugins developed and maintained by the community☆21Updated last year
- Command line interface to Carbon Black Response☆38Updated 5 years ago
- FRAC and RIFT☆17Updated 6 years ago
- ☆55Updated 3 years ago
- Python IOC Editor☆64Updated 10 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 10 years ago
- Powershell Functions to interact with TheHive-Project☆11Updated 6 years ago
- Carbonblack Live Response from the comfort of your own terminal☆20Updated 9 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆68Updated 5 years ago
- Mass Triage Tools☆20Updated this week
- Quick script to build host or investigation timelines using Carbon Black Response☆12Updated 7 years ago
- Log Examination Tool☆27Updated 9 years ago
- CrowdStrike Threat Intelligence☆35Updated 2 years ago
- Emulates the Sysinternals Autoruns tool, but for DFIR purposes e.g. multi user processing☆55Updated 6 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Updated 5 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Updated 2 years ago
- Hunting IOCs all day every day...☆87Updated 2 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20Updated 3 years ago