tcw3bb / ISC_Posts
Files from my Storm Center Articles
☆17Updated last year
Alternatives and similar repositories for ISC_Posts:
Users that are interested in ISC_Posts are comparing it to the libraries listed below
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆21Updated 6 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Queries to parse sysmon event log file with microsoft logparser☆56Updated 9 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 3 months ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Updated 11 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆76Updated 7 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 7 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated 10 months ago
- BRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to captu…☆19Updated 4 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Updated 3 years ago
- Python script to pull various IOCs from PDFs☆15Updated 10 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Bro IDS + ELK Stack to detect and block data exfiltration☆47Updated 6 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- ☆12Updated 6 years ago
- Modular tool to test exfiltration techniques.☆36Updated 7 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 2 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Updated 11 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago