weslambert / velociraptor-dockerLinks
Docker image for Velocidex Velociraptor
☆141Updated 9 months ago
Alternatives and similar repositories for velociraptor-docker
Users that are interested in velociraptor-docker are comparing it to the libraries listed below
Sorting:
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆117Updated 2 years ago
- Powershell module for VMWare vSphere forensics☆157Updated last year
- An opensource sigma conversion tool built using pysigma☆150Updated last month
- A python script developed to process Windows memory images based on triage type.☆265Updated 2 years ago
- ☆13Updated last year
- Tools for simulating threats☆197Updated 2 years ago
- A repository of my own Sigma detection rules.☆162Updated 2 weeks ago
- Incident Response documents and tooling☆110Updated 3 months ago
- Rules generated from our investigations.☆202Updated 5 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Updated 3 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆207Updated 5 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆156Updated 4 years ago
- Repository of public reference frameworks for the DFIR community.☆120Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆168Updated 2 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆157Updated 9 months ago
- ☆53Updated last year
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆245Updated 8 months ago
- ☆68Updated 2 weeks ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆166Updated last week
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆140Updated last year
- Jupyter notebooks for threat hunting☆60Updated 8 months ago
- Harness the power of Splunk for your investigations☆143Updated last month
- ☆76Updated 2 months ago
- SentinelOne STAR Rules☆69Updated 9 months ago
- A curated list of KAPE-related resources☆177Updated 7 months ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆112Updated 2 weeks ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆171Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆269Updated 7 months ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 2 months ago