Tools and scripts by Arctic Wolf
☆70Jul 14, 2025Updated 8 months ago
Alternatives and similar repositories for wolf-tools
Users that are interested in wolf-tools are comparing it to the libraries listed below
Sorting:
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- ☆18Feb 20, 2019Updated 7 years ago
- log4j PowerShell Checker☆18Dec 13, 2021Updated 4 years ago
- This bit of code scans over a folder set in a variable, then e-mails a set address if there are permissions for individual users.☆11Sep 12, 2016Updated 9 years ago
- Connectwise Automate - Grafana Dashboards☆17Mar 14, 2019Updated 7 years ago
- ☆34Jan 22, 2025Updated last year
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- A collection of scripts used to interact with the Burp Rest API☆56Feb 11, 2019Updated 7 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆16May 2, 2024Updated last year
- Multithreaded log4j vulnerability scanner using only bash! Tests all JNDI protocols, HTTP GET/POST, and 84 headers.☆26Dec 20, 2021Updated 4 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- ☆18Jan 14, 2026Updated 2 months ago
- Hashes for vulnerable LOG4J versions☆155Dec 17, 2021Updated 4 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- ☆13Jan 28, 2024Updated 2 years ago
- ☆110Apr 14, 2023Updated 2 years ago
- A Windows DNS content pack for graylog.☆20Dec 13, 2023Updated 2 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- ☆12Jun 6, 2025Updated 9 months ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 8 months ago
- Little PowerShell module to extract PowerShell scripts that no longer exists on disk but were run and are still in Event Logs.☆41Jan 19, 2021Updated 5 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Tool to analyze and detect MITM phishing toolkits on the web.☆83Dec 1, 2021Updated 4 years ago
- A small tool to easily mount APFS image on macOS for forensics.☆16Jul 30, 2020Updated 5 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 7 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆32Aug 16, 2023Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- Standalone scripts and N-Central automation policies☆178Jan 31, 2025Updated last year
- A maturity workbook for NIST CSF 2.0☆22Mar 2, 2024Updated 2 years ago
- scripts for Windows 10 default settings without using sysprep audit mode☆12Jul 29, 2024Updated last year
- ☆24Aug 30, 2019Updated 6 years ago