joeavanzato / velociraptor-timeline-creator
VTC - Velociraptor Timeline Creator
☆15Updated 9 months ago
Alternatives and similar repositories for velociraptor-timeline-creator:
Users that are interested in velociraptor-timeline-creator are comparing it to the libraries listed below
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 2 months ago
- Baseline a Windows System against LOLBAS☆25Updated 9 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated 2 weeks ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆13Updated last year
- ESXi Cyber Security Incident Response Script☆23Updated 5 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆36Updated 2 months ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆26Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆53Updated 2 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated 2 months ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆19Updated last month
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 2 months ago
- Yara Rules for Modern Malware☆73Updated 11 months ago
- ☆32Updated last year
- Contains compiled binaries of Volatility☆33Updated 3 weeks ago
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated this week
- ShellSweeping the evil.☆52Updated 7 months ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Living off the False Positive!☆33Updated 2 weeks ago
- ☆20Updated 2 years ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 5 months ago
- This Repository gives the best and possible strategies against hunting the ransomware☆25Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆33Updated 3 weeks ago
- create a "simulated internet" cyber range environment☆15Updated last week