thirdeyeintelligence / Tools-mindmapLinks
mindmap created for tools can be used during analysis/investigation
☆27Updated 8 years ago
Alternatives and similar repositories for Tools-mindmap
Users that are interested in Tools-mindmap are comparing it to the libraries listed below
Sorting:
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- ☆30Updated 6 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Open Development projects for TekDefense☆77Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆17Updated 4 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆21Updated 6 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Fast incident overview☆39Updated 8 years ago
- Tools for parsing Forensic images☆41Updated 6 years ago
- Site for IWS book content☆18Updated 6 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 7 years ago
- Splunk app for Threat hunting☆15Updated 6 years ago
- Mass Triage Tools☆20Updated 3 months ago
- 504 VSAgent☆23Updated 7 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Some rules, scripts of some use to us☆9Updated 7 months ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Expert Investigation Guides☆51Updated 4 years ago
- ☆32Updated 6 months ago
- Powershell Functions to interact with TheHive-Project☆10Updated 5 years ago
- ☆39Updated 5 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 6 years ago