yasser-alghamdi / winterfell-huntLinks
Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winterfell collection package
☆15Updated 4 years ago
Alternatives and similar repositories for winterfell-hunt
Users that are interested in winterfell-hunt are comparing it to the libraries listed below
Sorting:
- ☆21Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- C# User Simulation☆32Updated 2 years ago
- Windows Security Logging☆43Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 5 months ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Threat Mitigation Strategies☆25Updated 2 years ago
- Resources and Discussions About Detection Engineering☆12Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆29Updated 4 years ago
- Bloodhound Portable for Windows☆52Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- ☆10Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- ☆27Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Updated 2 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- A location where I save and share notes about security topics.☆11Updated 5 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- PowerShell Memory Pulling script☆19Updated 10 years ago