Stars
Lostar303 / Sparrow
Forked from cisagov/SparrowSparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.
Lostar303 / chainsaw
Forked from WithSecureLabs/chainsawRapidly Search and Hunt through Windows Event Logs
Rapidly Search and Hunt through Windows Forensic Artefacts
Lostar303 / grr
Forked from google/grrGRR Rapid Response: remote live forensics for incident response
Lostar303 / hetty
Forked from dstotijn/hettyHetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec …
Lostar303 / CyberChef
Forked from gchq/CyberChefThe Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
This is used for contributions to the Windows 10 content for IT professionals on docs.microsoft.com.
Lostar303 / cti
Forked from mitre/ctiCyber Threat Intelligence Repository expressed in STIX 2.0
GRR Rapid Response: remote live forensics for incident response
Scripts and a (future) library to improve u 67E5 sers' interactions with the ATT&CK content
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
Lostar303 / caldera
Forked from mitre/calderaAutomated Adversary Emulation
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
This repository is used for Windows client for IT Pro content on Microsoft Learn.
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Th…