orlikoski / SkadiLinks
Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux
☆504Updated 3 years ago
Alternatives and similar repositories for Skadi
Users that are interested in Skadi are comparing it to the libraries listed below
Sorting:
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆344Updated 3 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆250Updated 4 years ago
- Documentation of TheHive☆401Updated 2 years ago
- User guide of MISP☆281Updated 11 months ago
- Documentation of Cortex☆175Updated 2 years ago
- CASCADE Server☆274Updated 2 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆456Updated 3 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆129Updated 3 years ago
- A framework for orchestrating forensic collection, processing and data export☆333Updated 3 weeks ago
- Scripts and code referenced in CrowdStrike blog posts☆334Updated 6 years ago
- Powershell Threat Hunting Module☆287Updated 9 years ago
- SIFT☆520Updated last year
- CLI tool to manage a SIFT Install☆421Updated 2 years ago
- Python API Client for TheHive☆234Updated last week
- DFIRTrack - The Incident Response Tracking Application☆527Updated last year
- ☆201Updated 4 years ago
- MITRE ATT&CK Windows Logging Cheat Sheets☆345Updated 7 years ago
- ☆222Updated 2 years ago
- Salt States for Configuring the SIFT Workstation☆106Updated last week
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆351Updated 5 years ago
- DPS' Lightweight Investigation Notebook☆433Updated last year
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- CyLR - Live Response Collection Tool☆700Updated 3 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆210Updated 5 years ago
- ☆280Updated 2 years ago
- 16,432 Free Yara rules created by☆390Updated 6 years ago
- ☆175Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆287Updated 8 years ago
- Main Build directory☆179Updated 6 years ago
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆241Updated 4 years ago