Skip to content

Latest commit

 

History

History
117 lines (66 loc) · 5.48 KB

incident-response.md

File metadata and controls

117 lines (66 loc) · 5.48 KB

Meerkat

Meerkat is collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints without requiring a pre-deployed agent. Use cases include incident response triage, threat hunting, baseline monitoring, snapshot comparisons, and more.

https://github.com/TonyPhipps/Meerkat


Live-Forensicator

Live Forensicator is part of the Black Widow Toolbox, its aim is to assist Forensic Investigators and Incidence responders in carrying out a quick live forensic investigation https://github.com/Johnng007/Live-Forensicator


Malware Analysis, Threat Hunting, Incident Response, Threat Intelligence

https://github.com/ShilpeshTrivedi/Malware-IR-TH-TI-Resources/blob/main/Malware-IR-TH-TI-Resources.md


CimSweep

CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows

https://github.com/PowerShellMafia/CimSweep


Kansa

A modular incident response framework in Powershell

https://github.com/davehull/Kansa


TRIDENT

TRIDENT is a PowerShell script for fast triage and collection of evidence from forensic artifacts and volatile data, aimed to assist in the identification of compromise in Windows systems

https://github.com/nov3mb3r/trident


PoSH-R2

PoSH-R2 is a set of Windows Management Instrumentation (WMI) scripts that investigators and forensic analysts can use to retrieve information from a compromised (or potentially compromised) Windows system

https://github.com/WiredPulse/PoSh-R2


Get-Baseline

This script is used to get useful baseline information from windows systems in scope. It is designed for the Incident Response scenario. It primarily relies on PowerShell

https://github.com/securycore/Get-Baseline/blob/master/Get-Baseline.ps1


PSHunt

PSHunt is a Powershell Threat Hunting Module designed to scan remote endpoints* for indicators of compromise or survey them for more comprehensive information related to state of those systems (active processes, autostarts, configurations, and/or logs)

https://github.com/Infocyte/PSHunt


WINspect

WINspect is part of a larger project for auditing different areas of Windows environments. It focuses on enumerating different parts of a Windows machine to identify security weaknesses and point to components that need further hardening

https://github.com/A-mIn3/WINspect


PSRecon

PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team. The data can be pushed to a share, sent over email, or retained locally:

https://github.com/gfoss/PSRecon


NOAH

NOAH is an agentless open source Incident Response framework based on PowerShell, called "No Agent Hunting" (NOAH), to help security investigation responders to gather a vast number of key artifacts without installing any agent on the endpoints saving precious time:

https://github.com/giMini/NOAH


ThreatHunting-Module

ThreatHunting-Module https://github.com/securycore/ThreatHunting

Powerless batch file

Powerless batch file https://raw.githubusercontent.com/gladiatx0r/Powerless/master/Powerless.bat


More scripts

https://github.com/nettitude/PoshC2/tree/master/resources/modules

Powerup

PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations. See README.md for more information. https://github.com/PowerShellEmpire/PowerTools/blob/master/PowerUp/PowerUp.ps1


Check Event Logs

https://github.com/high101bro/PoSh-EasyWin/blob/9a88a63683fa2c4eb7fd014c2d189ee7faeb6603/Dependencies/Code/Main%20Body/Invoke-DeepBlue24Hours.ps1

https://github.com/dotps1/PSFunctions/blob/d364655e0210c19713fd2dd3906585809702f1e7/Functions/Get-ApplockerWinEvent.ps1

https://github.com/jennifergates/PowerShell-Scripting/blob/f045da02df7a2f465a37b9492398eeab8504375b/check-critical-events.ps1

https://github.com/oneoffdallas/check_ioc/blob/98c99d814b91cba39ffa459f1a3b632fe7f1e6ed/check_ioc.ps1

https://github.com/r3p3r/sans-blue-team-DeepBlueCLI/blob/a98ef0e4025929418f1bbccf8329961106a0ca9c/DeepBlue.ps1