trailofbits / osquery-extensions
osquery extensions by Trail of Bits
☆263Updated last year
Alternatives and similar repositories for osquery-extensions:
Users that are interested in osquery-extensions are comparing it to the libraries listed below
- A repository for using osquery for incident detection and response☆842Updated 2 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆790Updated last year
- AutoMacTC: Automated Mac Forensic Triage Collector☆534Updated 2 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆123Updated 4 years ago
- A framework for orchestrating forensic collection, processing and data export☆307Updated this week
- Osquery launcher, autoupdater, and packager☆517Updated this week
- Cisco Orbital - Osquery queries by Talos☆130Updated 7 months ago
- Osquery Mangement Server☆113Updated 4 years ago
- Automated Use Case Testing☆167Updated 6 years ago
- Extension to Cuckoo Sandbox open source projects, adds support to AWS cloud functionalities and enables running emulation on auto-scaling…☆136Updated 3 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆204Updated 4 years ago
- an osquery fleet manager☆618Updated 2 years ago
- Main Build directory☆179Updated 5 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- CASCADE Server☆266Updated 2 years ago
- Searches For Threat Hunting and Security Analytics☆241Updated 3 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆500Updated 2 years ago
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆62Updated last year
- Django web interface for managing Yara rules☆190Updated 6 years ago
- File Scanning Framework☆292Updated 3 years ago
- 1-Click push forensics evidence to the cloud☆142Updated 8 months ago
- [⛔️ Deprecated] Venator is a python tool used to gather data for proactive detection of malicious activity on macOS devices.☆177Updated 4 years ago
- ☆160Updated 4 years ago
- ☆171Updated 8 months ago
- Manage, monitor and improve your cyber security posture.☆89Updated last year
- Automatically create YARA rules from malicious documents.☆210Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆237Updated 3 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- simple YARA-based IOC scanner☆169Updated last month