Includes a smorgasbord of LogRhythm related utilities and scripts that are all 100% unofficial and should never be used by anyone, ever.
☆20Apr 12, 2018Updated 7 years ago
Alternatives and similar repositories for LR-Utilities
Users that are interested in LR-Utilities are comparing it to the libraries listed below
Sorting:
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- SmartResponse plugin development.☆15Sep 25, 2019Updated 6 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Apr 13, 2020Updated 5 years ago
- ☆37Feb 4, 2026Updated 3 weeks ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week
- Resources for the Customizing Chef book☆11Sep 12, 2014Updated 11 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- SecurityCenter 5 API Scripts☆10Jan 17, 2019Updated 7 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- 🌦️ Domain Ranker☆16Sep 7, 2019Updated 6 years ago
- PowerKrabsEtw is a PowerShell interface for doing real-time ETW tracing.☆103Nov 17, 2020Updated 5 years ago
- memory dump tool mirror for version 3.0.20171228.1☆17Oct 13, 2021Updated 4 years ago
- ☆11Aug 3, 2018Updated 7 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Power Prompt - Enhance ChatGPT & OpenAi interaction. Seamless conversations. Choose models, save templates, set temp, length & tokens.☆16Feb 15, 2023Updated 3 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- OS Lockdown☆13Nov 21, 2017Updated 8 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago