nrrpinto / inquisitor
Forensics artifacts collection
☆19Updated 3 years ago
Alternatives and similar repositories for inquisitor:
Users that are interested in inquisitor are comparing it to the libraries listed below
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- ☆21Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Baseline a Windows System against LOLBAS☆25Updated 10 months ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated 11 months ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 6 months ago
- ☆46Updated this week
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- ☆28Updated 4 years ago
- ☆63Updated 3 years ago
- ☆86Updated last year
- ☆34Updated last year
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated 2 weeks ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆55Updated 9 years ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- A running list of Windows sources and the related event ids.☆19Updated last year
- ESXi Cyber Security Incident Response Script☆23Updated 6 months ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated 11 months ago
- Linux Baseline and Forensic Triage Tool - BETA☆53Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- ReWrite of AChoir in Go for Cross Platform☆39Updated 2 weeks ago
- Full of public notes and Utilities☆98Updated last month
- Tools and scripts to deploy and manage OpenRelik instances☆13Updated 2 weeks ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year