yasser-alghamdi / winterfell-collection
Winterfell is a group of windows batch scripts to collect Windows forensics data and perform efficient, and fast incident response and threat hunting activities.
☆52Updated 4 years ago
Related projects: ⓘ
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆51Updated 2 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 2 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated last year
- Extract BITS jobs from QMGR queue and store them as CSV records☆73Updated 2 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆108Updated 9 months ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆15Updated last year
- A PowerShell incident response script for quick triage☆75Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆17Updated 4 years ago
- ☆76Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆51Updated 3 years ago
- ☆28Updated last year
- ☆40Updated last year
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆33Updated 5 years ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆76Updated 4 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated last year
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆86Updated 2 years ago
- Collection of scripts provided for public use☆28Updated last month
- Hunt malware with Volatility☆46Updated 4 months ago
- My conference presentations☆66Updated 11 months ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆71Updated 8 months ago
- Azure Sentinel Template parser☆15Updated 3 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- Invoke-LiveResponse☆145Updated 2 years ago
- Crack base64(sha256(username)) hash from Microsoft Event ID 1029☆18Updated last year
- Python library for threat intelligence☆78Updated 2 months ago
- A CALDERA plugin for autonomous incident response☆23Updated 7 months ago