orlikoski / Skadi
Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux
☆497Updated 2 years ago
Alternatives and similar repositories for Skadi:
Users that are interested in Skadi are comparing it to the libraries listed below
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆336Updated 2 years ago
- DFIRTrack - The Incident Response Tracking Application☆491Updated 5 months ago
- ☆1,058Updated 5 years ago
- CyLR - Live Response Collection Tool☆663Updated 2 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆241Updated 3 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆443Updated 3 years ago
- A framework for orchestrating forensic collection, processing and data export☆305Updated this week
- Documentation of TheHive☆395Updated last year
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆719Updated 5 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆350Updated 4 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- A Python package to interact with the Mitre ATT&CK Framework☆472Updated last year
- Online hash checker for Virustotal and other services☆820Updated 9 months ago
- 16,432 Free Yara rules created by☆381Updated 5 years ago
- An information security preparedness tool to do adversarial simulation.☆1,111Updated 5 years ago
- Collecting & Hunting for IOCs with gusto and style☆236Updated 3 years ago
- MITRE ATT&CK Windows Logging Cheat Sheets☆334Updated 6 years ago
- An open source framework for enterprise level automated analysis.☆395Updated 2 years ago
- DPS' Lightweight Investigation Notebook☆427Updated last year
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,144Updated last year
- Data from a BRAWL Automated Adversary Emulation Exercise☆204Updated 4 years ago
- A set of Zeek scripts to detect ATT&CK techniques.☆574Updated 7 months ago
- User guide of MISP☆265Updated last month
- Automated Use Case Testing☆166Updated 6 years ago
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆442Updated 3 months ago
- ☆197Updated 3 years ago
- Powershell Threat Hunting Module☆282Updated 8 years ago
- Modular file scanning/analysis framework☆619Updated 5 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆463Updated 6 years ago
- ☆212Updated last year