mark-hallman / plaso_filters
Scripts to facilitate filtering with Plaso
☆124Updated 4 years ago
Related projects: ⓘ
- Collection of useful, up to date, Carbon Black Response Queries☆82Updated 3 years ago
- Dump of organized knowledge on DFIR☆132Updated 2 years ago
- ATT&CK Remote Threat Hunting Incident Response☆196Updated 5 years ago
- ☆84Updated 3 months ago
- Invoke-LiveResponse☆145Updated 2 years ago
- ☆41Updated 3 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆192Updated 3 years ago
- The home of the BriMor Labs rdpieces Perl script that tries to rebuild parsed RDP Bitmap Cache images☆76Updated last year
- ☆113Updated 7 months ago
- ☆76Updated 5 years ago
- Office365 Log Analysis Framework☆81Updated 5 years ago
- Sigma Detection Rule Repository☆84Updated 4 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆123Updated last year
- Security Monitoring Resolution Categories☆138Updated 2 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆71Updated 8 months ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆106Updated 4 years ago
- A Splunk app to use MISP in background☆109Updated 8 months ago
- Repository of public reference frameworks for the DFIR community.☆105Updated last year
- ☆101Updated this week
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆90Updated 11 months ago
- ☆28Updated last year
- ☆293Updated 4 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆170Updated last month
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆95Updated 4 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆51Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆105Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- Automagically extract forensic timeline from volatile memory dump☆123Updated 4 months ago
- Tools to automate and/or expedite response.☆113Updated 2 months ago
- 2021 SANS DFIR Summit: Greppin' Logs☆21Updated 3 years ago