log Forenix 🕵️- Your Linux Forensic Artifacts Collector Tool! 🚀
☆30Jun 18, 2024Updated last year
Alternatives and similar repositories for logForenix
Users that are interested in logForenix are comparing it to the libraries listed below
Sorting:
- SubnetWizard is a Python Based CLI tools for subnet calculating☆52Apr 4, 2024Updated last year
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Jun 20, 2020Updated 5 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆20Jul 1, 2023Updated 2 years ago
- ☆21Apr 19, 2024Updated last year
- Winterfell is a group of windows batch scripts to collect Windows forensics data and perform efficient, and fast incident response and th…☆52Jul 23, 2020Updated 5 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Jul 21, 2020Updated 5 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- ☆10Dec 19, 2023Updated 2 years ago
- A repository for managing the complete lifecycle of large language model (LLM) development. This toolkit integrates open-source framework…☆12Jan 8, 2025Updated last year
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- Built for brute-force attack, constructed using the Rust language for the most sensitive network protocols and services, including FTP, S…☆11Dec 26, 2024Updated last year
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- 基于机器学习的Webshell检测工具☆12May 15, 2023Updated 2 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- go client for the wazuh rest api☆12Nov 1, 2025Updated 4 months ago
- ☆11May 2, 2022Updated 3 years ago
- This DuckyScript, created by ooovenenoso, automates the removal of problematic CrowdStrike files causing BSOD on Windows. The script open…☆11Jul 23, 2024Updated last year
- Command line client for the Fugue API☆14Mar 7, 2023Updated 3 years ago
- OnCommand-Insight PowerShell Cmdlets☆12Feb 26, 2025Updated last year
- ALPHA/WIP for OSquery configuration for Mac and Linux Operating Systems☆16Jan 9, 2018Updated 8 years ago
- Connect to CyberArk Target servers transparently☆17Jul 15, 2020Updated 5 years ago
- ☆12Feb 27, 2026Updated last week
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Jun 28, 2025Updated 8 months ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Jan 11, 2020Updated 6 years ago
- ☆10Sep 9, 2015Updated 10 years ago
- PowerShell Scripts for Management / Reporting within Exchange On Premises / Online☆14Dec 28, 2022Updated 3 years ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated last year
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Sep 13, 2021Updated 4 years ago
- Network analysis with Wireshark, is the topic in this repo!☆14May 6, 2023Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 8 months ago
- Detect bots/crawlers/spiders via user-agent string☆13Feb 22, 2026Updated last week
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- A curated list of audit rules which extract from Source Code Auditing tools.☆15Feb 19, 2020Updated 6 years ago