securycore / ThreatHuntingLinks
Powershell collection designed to assist in Threat Hunting Windows systems.
☆27Updated 7 years ago
Alternatives and similar repositories for ThreatHunting
Users that are interested in ThreatHunting are comparing it to the libraries listed below
Sorting:
- Expert Investigation Guides☆52Updated 4 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Sysmon Splunk App☆47Updated 6 years ago
- automate your MISP installs☆68Updated 5 years ago
- ☆77Updated 6 years ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- incident response scripts☆19Updated 6 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- ☆39Updated 6 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- Office365 Log Analysis Framework☆81Updated 6 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated 2 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- Splunk app for Threat hunting☆15Updated 6 years ago
- Fast incident overview☆40Updated 8 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Updated 6 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- Invoke-LiveResponse☆149Updated 3 years ago
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆17Updated 10 years ago
- ☆49Updated 4 years ago
- CB API scripts for IR, administration, etc.☆32Updated 6 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 8 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- ☆30Updated 6 years ago
- Tools for parsing Forensic images☆41Updated 6 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆87Updated 3 years ago
- To parse ugly Microsoft DNS Logs....☆41Updated 7 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago