weslambert / velociraptor-docker
Docker image for Velocidex Velociraptor
☆123Updated last month
Alternatives and similar repositories for velociraptor-docker:
Users that are interested in velociraptor-docker are comparing it to the libraries listed below
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆108Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆91Updated 3 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆110Updated last week
- ☆51Updated 11 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆163Updated last year
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆108Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- An opensource sigma conversion tool built using pysigma☆122Updated 3 months ago
- A repository of my own Sigma detection rules.☆158Updated 7 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated last month
- ☆68Updated 4 months ago
- ☆6Updated 5 months ago
- Rules generated from our investigations.☆194Updated 3 weeks ago
- Powershell module for VMWare vSphere forensics☆150Updated 5 months ago
- Tools for simulating threats☆183Updated last year
- Harness the power of Splunk for your investigations☆98Updated 2 weeks ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- MISP Playbooks☆194Updated 2 months ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 3 weeks ago
- Incident Response documents and tooling☆70Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 2 months ago
- Anything Sysmon related from the MSTIC R&D team☆152Updated 10 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- ☆87Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- A curated list of KAPE-related resources☆166Updated 3 weeks ago
- SentinelOne STAR Rules☆59Updated 2 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆154Updated last week
- Full of public notes and Utilities☆98Updated 2 months ago