Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.
☆17Oct 28, 2023Updated 2 years ago
Alternatives and similar repositories for crackdown
Users that are interested in crackdown are comparing it to the libraries listed below
Sorting:
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- A repository of output using KAPE (!EZParser Module) for various publicly available forensic images!☆17Aug 31, 2024Updated last year
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 6 months ago
- ☆33Dec 4, 2022Updated 3 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆33Mar 9, 2022Updated 4 years ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 9 months ago
- StreamlitとLangGraphで実装したHuman-in-the-loop広告コピー文生成アプリケーション☆11Feb 15, 2025Updated last year
- [READ ONLY] Subtree split of the siyuan-packages-monorepo (see https://github.com/Zuoqiu-Yingyi/siyuan-packages-monorepo)☆12Jan 23, 2024Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆84Mar 3, 2022Updated 4 years ago
- Repository of creating different example suricata data sets☆37Jan 2, 2019Updated 7 years ago
- Living off the False Positive!☆42Jan 31, 2025Updated last year
- ⚡ Developer-friendly hybrid-RAG toolkit merging Graphiti, Qdrant, mem0, LlamaIndex, and LangChain into one powerful engine.☆15Jan 14, 2026Updated last month
- ☆11Dec 5, 2022Updated 3 years ago
- ☆12Aug 15, 2024Updated last year
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 3 months ago
- Various PowerShells scripts I've made (or others have made) to automate some of the boring stuff in my everyday DFIR journey!☆51Jan 9, 2026Updated last month
- Yet Another Memory Analyzer for malware detection☆203Apr 8, 2025Updated 11 months ago
- ☆13Dec 14, 2021Updated 4 years ago
- ☆10Jan 22, 2025Updated last year
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- Mikrotik's RouterOS script to check DNS service and update it if required☆11Feb 24, 2023Updated 3 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- ☆11May 24, 2017Updated 8 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 8 years ago
- ☆14Jun 1, 2023Updated 2 years ago