jbradley89 / osx_incident_response_scripting_and_analysisLinks
Scripts from my book OS X Incident Response Scripting and Analysis -> https://www.amazon.com/dp/012804456X/ref=cm_sw_r_tw_dp_U_x_fQeLAb68REHCM
☆50Updated 9 years ago
Alternatives and similar repositories for osx_incident_response_scripting_and_analysis
Users that are interested in osx_incident_response_scripting_and_analysis are comparing it to the libraries listed below
Sorting:
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆63Updated 2 years ago
- [⛔️ Deprecated] Venator is a python tool used to gather data for proactive detection of malicious activity on macOS devices.☆177Updated 5 years ago
- Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format.☆105Updated 7 years ago
- Different DFIR and CTI utilities☆37Updated 5 years ago
- Post-Infection Collection Toolkit☆95Updated 2 years ago
- Command line interface to Carbon Black Response☆38Updated 5 years ago
- InvestigationPlaybookSpec☆72Updated 8 years ago
- Community modules for FAME☆65Updated last month
- ☆15Updated 6 years ago
- ☆39Updated 6 years ago
- Swift Command line tool used for proactive detection of malicious activity on macOS systems.☆68Updated 5 years ago
- Scripts for MacOS related tasks.☆18Updated 5 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- Python IOC Editor☆63Updated 10 years ago
- ☆53Updated 7 years ago
- CB API scripts for IR, administration, etc.☆32Updated 6 years ago
- pollen - A command-line tool for interacting with TheHive☆36Updated 6 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆21Updated 7 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Updated 6 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆50Updated 7 years ago
- OS X Strata builds upon Yelps OSXCollector, providing a user interface to analyze data collected from a potentially compromised system.☆14Updated 6 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13Updated 7 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Community Sharing Repository for Carbon Black and Bit9 Platforms☆27Updated 3 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Updated 2 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Updated 2 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago