Defensive security — log analysis, threat hunting, incident response, DFIR.
Official PageDigital forensics platform
Download from sleuthkit.orgOpen disk image, run ingest modulesMemory forensics framework
pip3 install volatility3vol.py -f memory.dmp windows.pslist; vol.py -f mem.dmp windows.netscanPattern matching for malware
sudo apt install yarayara rules.yar /path/to/scanPacket analyzer
sudo apt install wiresharkwireshark -r capture.pcapNetwork security monitor
sudo apt install zeekzeek -r capture.pcapOpen-source SIEM (ELK)
docker-compose up (from elastic docs)Kibana KQL: event.code:4625 AND NOT user.name:SYSTEMIndustry-leading SIEM platform
Download from splunk.comindex=windows source="WinEventLog:Security" EventCode=4625 | stats count by src_ipWindows event log hunting tool
Download from github releaseschainsaw hunt /var/log/windows/ --rules sigma/ --mapping mappings/sigma-event-logs-all.ymlWindows event log threat hunting
Download from github releaseshayabusa csv-timeline -f Security.evtx -o timeline.csvThreat intelligence platform
Docker: docker-compose upImport/export IOCs, share threat intel