Microsoft Office365 Protection Center Audit Log Parser
☆27Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for o365AuditParser
Users that are interested in o365AuditParser are comparing it to the libraries listed below
Sorting:
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Sentinel Threat Intelligence Upload Toolkit☆18Jul 15, 2024Updated last year
- USN Journal full path builder☆66Sep 16, 2024Updated last year
- Forensic tool for acquisition, triage and analysis of remote block devices via iSCSI protocol.☆44Oct 25, 2024Updated last year
- Short scripts which use the registry to enable or disable write-blocking for removable disks☆34Oct 12, 2023Updated 2 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆771Updated this week
- L.I.A.M is an open source case management system for digital forensics labs. Law-Enforcement Investigations and Asset Management☆13Jul 4, 2025Updated 8 months ago
- Examples for the CyCLI Powershell module☆12Mar 8, 2019Updated 6 years ago
- ☆12Feb 16, 2023Updated 3 years ago
- aarch64 Malware course☆11Nov 13, 2025Updated 3 months ago
- ☆14Sep 22, 2021Updated 4 years ago
- A repo to centralize some of the regular expressions I've found useful over the course of my DFIR career.☆107Nov 23, 2022Updated 3 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- a personal PowerShell Profile Module for tools/functions☆10Jun 19, 2025Updated 8 months ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- The ultimate streamline for Volatility 3. Speed up process of memory artifacts extraction phase☆14Dec 19, 2024Updated last year
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- USB Rubber Ducky Scripts and other Lovely Programs.☆12Oct 26, 2021Updated 4 years ago
- A simple server to act as a Veeam "honeypot" providing alerting for network scans for Veeam services☆16Aug 31, 2025Updated 6 months ago
- ☆13May 30, 2025Updated 9 months ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- ☆12Nov 14, 2023Updated 2 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- CLI generator for Velociraptor offline collector☆16Oct 10, 2025Updated 4 months ago
- ☆14Oct 24, 2024Updated last year
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- ☆14Apr 4, 2024Updated last year
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 6 months ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago