AzureHunter
beagle
AzureHunter | beagle | |
---|---|---|
2 | 1 | |
764 | 1,250 | |
- | - | |
0.0 | 0.0 | |
over 1 year ago | over 1 year ago | |
PowerShell | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
AzureHunter
beagle
What are some alternatives?
DetectionLabELK - DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.
evtx-hunter - evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
sysmon-modular - A repository of sysmon configuration modules
dfirtrack - DFIRTrack - The Incident Response Tracking Application
CloudShell - Container Image for Azure Cloud Shell (https://azure.microsoft.com/en-us/features/cloud-shell/)
timesketch - Collaborative forensic timeline analysis
ARI - Azure Resource Inventory - It's a Powerful tool to create EXCEL inventory from Azure Resources with low effort
dfir-orc - Forensics artefact collection tool for systems running Microsoft Windows
Hunting-Queries-Detection-Rules - KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Kuiper - Digital Forensics Investigation Platform
Trawler - PowerShell script to help Incident Responders discover potential adversary persistence mechanisms.
RELY - RELY (Name composed on project members Romy, Esther, Lucille and Yassir) is a python tool developed to help a Digital Forensics Triage procedure on some Microsoft Windows devices.