| Yamato-Security/hayabusa |
1,800 |
|
0 |
0 |
about 2 years ago |
0 |
|
33 |
gpl-3.0 |
Rust |
| Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs. |
| jurelou/epagneul |
180 |
|
0 |
0 |
over 3 years ago |
0 |
|
0 |
|
Python |
| Graph Visualization for windows event logs |
| AdamWhiteHat/Judge-Jury-and-Executable |
68 |
|
0 |
0 |
almost 3 years ago |
0 |
|
0 |
agpl-3.0 |
C |
| A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL. |
| yasser-alghamdi/winterfell-collection |
39 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
|
Batchfile |
| Winterfell is a group of windows batch scripts to collect Windows forensics data and perform efficient, and fast incident response and threat hunting activities. |
| emrekybs/Douglas-042 |
26 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
mit |
PowerShell |
| Powershell script to help Speed up Threat hunting incident response processes |
| tvfischer/ps-srum-hunting |
13 |
|
0 |
0 |
over 6 years ago |
0 |
|
0 |
mpl-2.0 |
PowerShell |
| PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting |
| Kirtar22/ThreatHunting_with_Osquery |
11 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
|
|
| Threat Hunting & Incident Investigation with Osquery |
| wuseman/tshark-cheatsheet |
7 |
|
0 |
0 |
over 3 years ago |
0 |
|
0 |
gpl-3.0 |
|
| Hunting Fish with tshark. Active/Passive/Realtime/Live Threat Hunting |