jakob-source / falcon-crowdstrike
A collection of searches, interesting events and tables on Crowdstrike Splunk.
☆29Updated 4 years ago
Alternatives and similar repositories for falcon-crowdstrike:
Users that are interested in falcon-crowdstrike are comparing it to the libraries listed below
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- ☆20Updated 4 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 3 months ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆26Updated 4 months ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- BloodHound Data Scanner☆45Updated 4 years ago
- ESXi Cyber Security Incident Response Script☆23Updated 7 months ago
- ☆15Updated 4 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Updated 6 years ago
- ☆41Updated last year
- Kerberoast Detection Script☆30Updated 5 months ago
- OSSEM Modular☆27Updated 4 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 4 years ago
- incident response scripts☆19Updated 6 years ago
- Threat Mitigation Strategies☆25Updated last year
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 5 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 3 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- A repository of Sysmon For Linux configuration modules☆15Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 6 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year