beagle
AzureHunter
Our great sponsors
beagle | AzureHunter | |
---|---|---|
1 | 2 | |
1,250 | 755 | |
- | - | |
0.0 | 0.0 | |
over 1 year ago | over 1 year ago | |
Python | PowerShell | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
beagle
AzureHunter
What are some alternatives?
evtx-hunter - evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
DetectionLabELK - DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.
dfirtrack - DFIRTrack - The Incident Response Tracking Application
sysmon-modular - A repository of sysmon configuration modules
timesketch - Collaborative forensic timeline analysis
CloudShell - Container Image for Azure Cloud Shell (https://azure.microsoft.com/en-us/features/cloud-shell/)
dfir-orc - Forensics artefact collection tool for systems running Microsoft Windows
ARI - Azure Resource Inventory - It's a Powerful tool to create EXCEL inventory from Azure Resources with low effort
Kuiper - Digital Forensics Investigation Platform
Hunting-Queries-Detection-Rules - KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
RELY - RELY (Name composed on project members Romy, Esther, Lucille and Yassir) is a python tool developed to help a Digital Forensics Triage procedure on some Microsoft Windows devices.
Trawler - PowerShell script to help Incident Responders discover potential adversary persistence mechanisms.