trailofbits / osquery-extensions
osquery extensions by Trail of Bits
☆264Updated last year
Alternatives and similar repositories for osquery-extensions:
Users that are interested in osquery-extensions are comparing it to the libraries listed below
- A repository for using osquery for incident detection and response☆837Updated 2 years ago
- AutoMacTC: Automated Mac Forensic Triage Collector☆537Updated 2 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆787Updated last year
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆123Updated 4 years ago
- Automated Use Case Testing☆167Updated 6 years ago
- Searches For Threat Hunting and Security Analytics☆240Updated 3 years ago
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆62Updated last year
- Osquery Mangement Server☆114Updated 4 years ago
- ☆169Updated 7 months ago
- Osquery launcher, autoupdater, and packager☆515Updated this week
- ☆160Updated 4 years ago
- 1-Click push forensics evidence to the cloud☆141Updated 7 months ago
- Aftermath is a free macOS IR framework☆493Updated 2 months ago
- Cisco Orbital - Osquery queries by Talos☆130Updated 5 months ago
- [⛔️ Deprecated] Venator is a python tool used to gather data for proactive detection of malicious activity on macOS devices.☆177Updated 4 years ago
- Osquery Resources☆60Updated 5 years ago
- Main Build directory☆178Updated 5 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆80Updated 4 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆498Updated 2 years ago
- Django web interface for managing Yara rules☆190Updated 6 years ago
- ☆275Updated last year
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆175Updated 4 months ago
- Fast and efficient osquery management☆413Updated this week
- A framework for orchestrating forensic collection, processing and data export☆305Updated this week
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Manage, monitor and improve your cyber security posture.☆87Updated last year
- Threat Feed Aggregation, Made Easy☆167Updated 4 years ago
- Yara integrated software to handle archive file data.☆305Updated 2 years ago