rtkwlf / wolf-tools
Tools and scripts by Arctic Wolf
☆67Updated last year
Alternatives and similar repositories for wolf-tools:
Users that are interested in wolf-tools are comparing it to the libraries listed below
- ☆41Updated 2 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- ☆62Updated 3 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆38Updated 6 years ago
- My conference presentations☆66Updated last year
- The PoLRBear Project☆35Updated 4 years ago
- Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical under…☆25Updated 4 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 4 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 5 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆67Updated 4 years ago
- Find accounts using common and default passwords in Active Directory.☆68Updated 5 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- ☆83Updated 2 months ago
- ☆54Updated 3 years ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 4 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 4 months ago
- ☆56Updated 3 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- HIBP Audit - Audit Active Directory user accounts against HIBP☆15Updated 3 years ago
- CrowdStrike Archive Scan Tool☆83Updated 3 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Pushes Sysmon Configs☆88Updated 3 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆66Updated 2 weeks ago
- ☆21Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year