Threathunt details for the Solarwinds compromise
☆33Jun 26, 2021Updated 4 years ago
Alternatives and similar repositories for solarwinds-threathunt
Users that are interested in solarwinds-threathunt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Leverage Sophos Central API☆33Sep 29, 2023Updated 2 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- SysScout is a fully encapsulated script that quickly and easily pulls local machine information from Linux-Based systems. A simple, easy…☆13Oct 20, 2017Updated 8 years ago
- Fast multipattern regular expression searching for digital forensics☆18Jul 31, 2019Updated 6 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Collection of useful, up to date, Carbon Black Response Queries☆84Oct 23, 2020Updated 5 years ago
- Install and configure auditd on your system.☆22Mar 17, 2026Updated 3 weeks ago
- ☆12Jun 3, 2022Updated 3 years ago
- Library of python scripts to apply Data Science in several forensics artifacts☆31Jul 16, 2020Updated 5 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Tool allows to convert text into Morse code and save to wav file.☆15Oct 17, 2013Updated 12 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆19Aug 11, 2022Updated 3 years ago
- Dockerized Prometheus + Grafana Monitoring stack☆11Nov 1, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Various tools and scripts☆43Nov 30, 2022Updated 3 years ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Recognizes your speech in mp3 audio file, wav file or laptop microphone and converts to text☆10Nov 18, 2019Updated 6 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- A lightweight C++/C AFF4 reader library☆14Feb 5, 2026Updated 2 months ago
- [DEPRECATED] Omnibus package for Graylog☆13Apr 26, 2019Updated 6 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆48Nov 22, 2025Updated 4 months ago
- It is a program which converts wav file to srt file and translates text language.☆13Jun 20, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Uses ghidra to find all ETW write metadata for each API in a PE file☆28Jul 26, 2024Updated last year
- Binary commandline executable to parse ETL files☆69Jun 7, 2018Updated 7 years ago
- geolocate ip addresses in IIS logs☆20Jan 8, 2025Updated last year
- Package storage for packages served through the package registry service☆10Jan 27, 2023Updated 3 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 3 years ago