mamun-sec / dfirt
Collect information of Windows PC when doing incident response
☆252Updated last year
Alternatives and similar repositories for dfirt:
Users that are interested in dfirt are comparing it to the libraries listed below
- Course repository for PowerShell for Pentesters Course☆427Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆457Updated 8 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆841Updated 3 years ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆516Updated 2 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆445Updated 2 years ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆288Updated 3 years ago
- MAL-CL (Malicious Command-Line)☆310Updated 2 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆777Updated 2 years ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆780Updated 2 years ago
- ☆700Updated last month
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆606Updated 8 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆278Updated 6 months ago
- PowerShell module for Office 365 and Azure log collection☆260Updated this week
- A PowerShell armoury for security guys and girls☆469Updated last year
- Pwnspoof repository☆258Updated last year
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆371Updated 5 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆147Updated 3 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆200Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,109Updated 9 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆486Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- An Office365 User Attack Tool☆630Updated 11 months ago
- Collection of PowerShell functions a Red Teamer may use in an engagement☆518Updated last year
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆562Updated 5 months ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆183Updated 3 years ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆477Updated 3 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆247Updated last month
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- ☆611Updated last year