orlikoski / SkadiLinks
Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux
☆504Updated 3 years ago
Alternatives and similar repositories for Skadi
Users that are interested in Skadi are comparing it to the libraries listed below
Sorting:
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆344Updated 3 years ago
- User guide of MISP☆281Updated 11 months ago
- Documentation of TheHive☆399Updated 2 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆251Updated 4 years ago
- DFIRTrack - The Incident Response Tracking Application☆528Updated last year
- CLI tool to manage a SIFT Install☆421Updated 2 years ago
- MITRE ATT&CK Windows Logging Cheat Sheets☆346Updated 7 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆129Updated 3 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆457Updated 3 years ago
- ☆200Updated 4 years ago
- ☆223Updated 2 years ago
- Powershell Threat Hunting Module☆287Updated 9 years ago
- Documentation of Cortex☆174Updated 2 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆352Updated 5 years ago
- An open source framework for enterprise level automated analysis.☆396Updated 3 years ago
- A framework for orchestrating forensic collection, processing and data export☆332Updated last week
- DPS' Lightweight Investigation Notebook☆434Updated last year
- Main Build directory☆179Updated 6 years ago
- Online hash checker for Virustotal and other services☆841Updated 9 months ago
- 16,432 Free Yara rules created by☆390Updated 6 years ago
- CASCADE Server☆274Updated 3 years ago
- Incident Response Hierarchy of Needs☆468Updated 2 years ago
- SIFT☆526Updated last year
- Data from a BRAWL Automated Adversary Emulation Exercise☆211Updated 5 years ago
- Scripts and code referenced in CrowdStrike blog posts☆334Updated 6 years ago
- FAME Automates Malware Evaluation☆919Updated last week
- ☆280Updated 2 years ago
- MISP trainings, threat intel and information sharing training materials with source code☆420Updated last week
- CyLR - Live Response Collection Tool☆703Updated 3 years ago
- ☆175Updated last year