A repository of sysmon configuration modules
-
Updated
Aug 21, 2024 - PowerShell
A repository of sysmon configuration modules
Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs
MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Awesome list of keywords and artifacts for Threat Hunting sessions
DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.
Timeline of Active Directory changes with replication metadata
A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.
PowerShell module for Office 365 and Azure log collection
Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR
Windows 10 (v1803+) ActivitiesCache.db parsers (SQLite, PowerShell, .EXE)
Win 10/11 related research
A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.
Powershell module for VMWare vSphere forensics
Invoke-LiveResponse
ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.
Add a description, image, and links to the dfir topic page so that developers can more easily learn about it.
To associate your repository with the dfir topic, visit your repo's landing page and select "manage topics."