mandiant / brickstorm-scannerLinks
β50Updated this week
Alternatives and similar repositories for brickstorm-scanner
Users that are interested in brickstorm-scanner are comparing it to the libraries listed below
Sorting:
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β78Updated 5 months ago
- MS Graph Commands and Tools for Blue Teamersβ50Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from themβ34Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β54Updated 10 months ago
- β26Updated 2 years ago
- Finding ClickFix and FakeCAPTCHA like it's 1999β61Updated this week
- β74Updated last week
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.β34Updated last year
- Extracting IoC data from eMailβ139Updated 2 months ago
- ASR Configurator, Essentials and Atomic Testingβ94Updated 5 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β49Updated last month
- Linux Baseline and Forensic Triage Tool - BETAβ57Updated 3 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β125Updated last year
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Groupβ86Updated 8 months ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integrationβ¦β17Updated 4 months ago
- Parse and analyze a Windows Amcache.hve registry hive, VirusTotal integration.β18Updated last month
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β52Updated 11 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.β62Updated last year
- β53Updated last month
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indiβ¦β109Updated 11 months ago
- God Mode Detection Rulesβ134Updated last year
- Slides of my public talksβ56Updated last year
- DShield Sensor Log Collection with ELKβ40Updated last week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Editionβ66Updated 3 years ago
- Detection rule validationβ41Updated last year
- A list of RMMs designed to be used in automation to build alertsβ113Updated 5 months ago
- β50Updated last month
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incβ¦β73Updated this week
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.β86Updated 3 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β157Updated 6 months ago