-
Updated
Mar 22, 2022 - Shell
#
dfir
Here are 382 public repositories matching this topic...
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
security
auditing
cloud
aws-lambda
incident-response
iam
dfir
cloudtrail
aws-infrastructure
security-tools
aws-inventory
A curated list of tools for incident response
-
Updated
Feb 25, 2022
good first issue
A good place to get started working with Zeek.
Type: Bug 🐛
Unexpected behavior or output.
Area: File Analysis
Area: Protocol Analysis
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
-
Updated
Mar 22, 2022 - XSLT
Automate the creation of a lab environment complete with security tooling and logging best practices
ansible
vagrant
packer
powershell
terraform
detection
dfir
vagrantfile
sysmon
osquery
information-security
lab-environment
detectionlab
dfir-automation
-
Updated
Mar 25, 2022 - HTML
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
-
Updated
Feb 19, 2022 - Python
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
-
Updated
Apr 16, 2021
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
api
open-source
platform
scala
rest
incident-response
orchestration
dfir
analyzer
free
misp
thehive
security-incidents
iocs
digital-forensics
investigations
cortex
agplv3
incident-management
incident-response-tooling
-
Updated
Feb 25, 2022 - Scala
Investigate malicious Windows logon by visualizing and analyzing Windows event log
-
Updated
Dec 19, 2021 - Python
A curated list of awesome forensic analysis tools and resources
-
Updated
Feb 3, 2022
jaegeral
commented
Dec 1, 2021
Uploading a foobar.txt file that has CSV content would still get uploaded and errored out on the backend side, even if the Client JS should error out already.
Request Method: POST
Status Code: 500
kingk789
commented
Feb 3, 2020
I was wondering the benefit of using Modular File Management vs Single Config File Management? Why do you consider it easier to use multiple files and then compile? Trying to figure out what the best case is for my use case. Thanks. #
Windows Events Attack Samples
-
Updated
Feb 19, 2022 - HTML
Signature base for my scanner tools
-
Updated
Mar 24, 2022 - YARA
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
-
Updated
Dec 10, 2018 - XSLT
VirusTotal Wanna Be - Now with 100% more Hipster
docker
golang
elasticsearch
cloud
malware
dfir
cybersecurity
infosec
antivirus
malware-analysis
malware-research
virustotal
malice
-
Updated
Dec 11, 2021 - Go
Your Everyday Threat Intelligence
-
Updated
Mar 21, 2022 - Python
A list of cyber-chef recipes and curated links
-
Updated
Mar 19, 2022
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
-
Updated
Mar 15, 2022 - Python
Malcom - Malware Communications Analyzer
-
Updated
Nov 29, 2017 - Python
A DFIR tool written in Python.
-
Updated
Jun 9, 2021 - Python
Educational, CTF-styled labs for individuals interested in Memory Forensics
-
Updated
Mar 8, 2021 - Shell
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
-
Updated
Nov 18, 2021
Cortex: a Powerful Observable Analysis and Active Response Engine
python
api
open-source
scala
rest
analysis
engine
incident-response
observable
dfir
free-software
analyzer
free
response
thehive
security-incidents
iocs
digital-forensics
cortex
cyber-threat-intelligence
-
Updated
Dec 20, 2021 - Scala
Web browser forensics for Google Chrome/Chromium
-
Updated
Mar 9, 2022 - Python
A collection of resources for Threat Hunters - Sponsored by Falcon Guard
-
Updated
Feb 4, 2022 - Python
Advanced Sysmon configuration, Installer & Auto Updater with high-quality event tracing
graylog
logging
dfir
sysmon
threat-hunting
threat-sharing
threatintel
netsec
sysinternals
graylog-plugin
threat-analysis
threat-intelligence
mitre-attack
-
Updated
Feb 20, 2019 - Batchfile
Extract and aggregate threat intelligence.
ioc
osint
dfir
threat-hunting
malware-research
misp
threat-sharing
threatintel
yara
threat-analysis
fraud-detection
intelligence-gathering
security-tools
threat-intelligence
soar
indicators-of-compromise
threat-feeds
threat-intelligence-platform
-
Updated
Aug 3, 2021 - Python
Improve this page
Add a description, image, and links to the dfir topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the dfir topic, visit your repo's landing page and select "manage topics."
Hello Zeek's community!
Zeek (master and 4.1) corrupts extracted PE executable from an HTTP response if the request has a non-expected Content-Type. Here is a proof-of-concept PCAP with two HTTP responses returning the same file but with different Content-Types. The first one with the right Content-Type "application/x-msdownload" and another one with "message/rfc822".
Zeek extracts the f