thinkst / canary-utils
Collection of useful Canary tools
☆78Updated 3 weeks ago
Alternatives and similar repositories for canary-utils
Users that are interested in canary-utils are comparing it to the libraries listed below
Sorting:
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- ☆118Updated last year
- Identify Azure blobs using a wordlist of account name and container name strings☆41Updated last month
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆134Updated 2 years ago
- ☆41Updated 2 years ago
- ☆16Updated 3 weeks ago
- A PowerShell incident response script for quick triage☆80Updated 2 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆103Updated 2 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Recon Hunt Queries☆77Updated 3 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆81Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 6 months ago
- A list of RMMs designed to be used in automation to build alerts☆110Updated last month
- Conference presentations☆47Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- My Jupyter Notebooks☆36Updated last month
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- ☆83Updated 2 months ago
- ☆94Updated 2 years ago
- Unleash the power of the Falcon Platform at the CLI☆117Updated last week
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated 11 months ago
- ☆58Updated last year
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 4 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆87Updated 9 months ago