rtkwlf / wolf-toolsLinks
Tools and scripts by Arctic Wolf
☆68Updated last year
Alternatives and similar repositories for wolf-tools
Users that are interested in wolf-tools are comparing it to the libraries listed below
Sorting:
- ☆64Updated 4 years ago
- ☆42Updated 2 years ago
- Collection of useful Canary tools☆82Updated 2 weeks ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆60Updated 9 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- ☆64Updated 4 months ago
- A set of Python scripts for finding threats in Office365☆50Updated 2 years ago
- CrowdStrike Archive Scan Tool☆85Updated 3 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- My conference presentations☆66Updated last year
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆52Updated 2 years ago
- Pushes Sysmon Configs☆88Updated 4 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- ☆54Updated 4 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- ☆72Updated 2 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated 9 months ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Updated 7 months ago
- ☆170Updated this week
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 5 years ago
- Run Velociraptor on Security Onion☆38Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- ☆74Updated last year
- Elastic Beat for fetching and shipping Office 365 audit events☆67Updated 4 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 4 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated 2 years ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 4 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆36Updated 3 years ago