mark-hallman / plaso_filters
Scripts to facilitate filtering with Plaso
☆124Updated 4 years ago
Alternatives and similar repositories for plaso_filters:
Users that are interested in plaso_filters are comparing it to the libraries listed below
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- Dump of organized knowledge on DFIR☆133Updated 3 years ago
- Invoke-LiveResponse☆147Updated 3 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆201Updated 3 years ago
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 3 months ago
- ☆5Updated 4 months ago
- ☆116Updated last year
- Repository of public reference frameworks for the DFIR community.☆115Updated last year
- Automagically extract forensic timeline from volatile memory dump☆128Updated 10 months ago
- The home of the BriMor Labs rdpieces Perl script that tries to rebuild parsed RDP Bitmap Cache images☆79Updated last year
- ☆77Updated 5 years ago
- ☆42Updated 4 years ago
- ☆302Updated 4 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆72Updated last year
- Collection of scripts provided for public use☆34Updated last week
- ☆33Updated 5 months ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆165Updated 6 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆84Updated last year
- Office365 Log Analysis Framework☆82Updated 5 years ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆125Updated 2 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆124Updated 3 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated last month
- Hunt malware with Volatility☆47Updated 10 months ago
- Detection of obfuscated Powershell commands☆54Updated last year