ine-labs / ThreatSeekerLinks
ThreatSeeker: Threat Hunting via Windows Event Logs
β121Updated 2 years ago
Alternatives and similar repositories for ThreatSeeker
Users that are interested in ThreatSeeker are comparing it to the libraries listed below
Sorting:
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β74Updated last month
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β155Updated last month
- β74Updated 2 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?β43Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β124Updated last year
- Windows Malware Investigation Scripts & Docsβ83Updated 6 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.β102Updated 9 months ago
- Advanced Bash script designed for conducting digital forensics on Linux systemsβ142Updated last year
- Track C2 servers, tools, and botnets over time by framework and locationβ39Updated 3 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detectionsβ185Updated 5 months ago
- β160Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999β38Updated this week
- A collection of CVEs weaponized by ransomware operatorsβ115Updated last week
- Completely Risky Active-Directory Simulation Hubβ100Updated last year
- Identify the accounts most vulnerable to dictionary attacksβ119Updated 2 months ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.β99Updated last month
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Responsβ¦β54Updated 7 months ago
- Powershell tools used for Red Team / Pentesting.β76Updated last year
- CarbonBlack EDR detection rules and response actionsβ71Updated 8 months ago
- β174Updated 5 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selecβ¦β32Updated 3 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β64Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory Cβ¦β251Updated last year
- β55Updated last year
- God Mode Detection Rulesβ134Updated 9 months ago
- VirtualGHOST Detection Toolβ91Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcatβ109Updated last year
- Mapping of open-source detection rules and atomic tests.β165Updated 4 months ago
- β177Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reportsβ118Updated last week