jbradley89 / osx_incident_response_scripting_and_analysisLinks
Scripts from my book OS X Incident Response Scripting and Analysis -> https://www.amazon.com/dp/012804456X/ref=cm_sw_r_tw_dp_U_x_fQeLAb68REHCM
☆50Updated 9 years ago
Alternatives and similar repositories for osx_incident_response_scripting_and_analysis
Users that are interested in osx_incident_response_scripting_and_analysis are comparing it to the libraries listed below
Sorting:
- [⛔️ Deprecated] Venator is a python tool used to gather data for proactive detection of malicious activity on macOS devices.☆177Updated 5 years ago
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆63Updated 2 years ago
- Post-Infection Collection Toolkit☆95Updated 2 years ago
- Scripts for MacOS related tasks.☆18Updated 5 years ago
- Swift Command line tool used for proactive detection of malicious activity on macOS systems.☆68Updated 5 years ago
- ☆39Updated 6 years ago
- InvestigationPlaybookSpec☆72Updated 8 years ago
- Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format.☆104Updated 7 years ago
- ☆53Updated 7 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- CB API scripts for IR, administration, etc.☆32Updated 6 years ago
- ☆15Updated 6 years ago
- Community Sharing Repository for Carbon Black and Bit9 Platforms☆27Updated 3 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆22Updated 7 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆58Updated 3 years ago
- Command line interface to Carbon Black Response☆38Updated 5 years ago
- Tools for parsing Forensic images☆41Updated 7 years ago
- Different DFIR and CTI utilities☆37Updated 5 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Updated 6 years ago
- A collection of typical false positive indicators☆55Updated 5 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆31Updated 5 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Updated 4 months ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13Updated 7 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆43Updated 9 years ago
- ☆32Updated 7 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆166Updated 7 years ago