jstrosch / FLARE-VM-configs
These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help streamline the installation.
☆14Updated 11 months ago
Alternatives and similar repositories for FLARE-VM-configs:
Users that are interested in FLARE-VM-configs are comparing it to the libraries listed below
- Contains compiled binaries of Volatility☆33Updated 2 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 4 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆39Updated 3 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Quick ESXi Log Parser☆17Updated 2 months ago
- ☆14Updated 11 months ago
- ☆28Updated this week
- Tools and scripts to deploy and manage OpenRelik instances☆13Updated last month
- ☆22Updated last month
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- Detection rule validation☆41Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆26Updated last month
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆35Updated 2 months ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆13Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- macOS Artifacts☆28Updated last month
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- ☆37Updated last year
- C2 Active Scanner☆55Updated 9 months ago
- ☆19Updated 2 months ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆28Updated 4 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆15Updated 3 months ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆61Updated 3 months ago
- Yara Rules for Modern Malware☆75Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆36Updated 2 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated 11 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year