Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ajackal/ir_scripts
incident response scripts
https://github.com/ajackal/ir_scripts
dfir forensics incident-response powershell sysmon threat-hunting windows
Last synced: about 1 month ago
JSON representation
incident response scripts
- Host: GitHub
- URL: https://github.com/ajackal/ir_scripts
- Owner: ajackal
- Created: 2018-04-16T13:48:19.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2019-03-04T22:21:34.000Z (almost 6 years ago)
- Last Synced: 2023-10-20T07:14:59.324Z (about 1 year ago)
- Topics: dfir, forensics, incident-response, powershell, sysmon, threat-hunting, windows
- Language: PowerShell
- Size: 12.7 KB
- Stars: 17
- Watchers: 4
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# ir_scripts
Scripts to aid in incident response and threat hunting.## Get-CorrelatedSysmonEvents
Get-CorrelatedSysmonEvents is used to build context around an event to provide threat hunters a better picture of what is happening. The original intent was to correlate Network Connection events (Event ID 3) with the process that spawned them (Process Creation, Event ID 1). However, its built to be flexible so that you can correlate any two Event IDs based on the unique Process GUID that Sysmon assigns.
This script was inspired by the work done by Robert Rodriguez (@Cyb3rWard0g) of SpectreOps with his 3 part post "Real-Time Sysmon Processing via KSQL and HELK"
https://posts.specterops.io/real-time-sysmon-processing-via-ksql-and-helk-part-1-initial-integration-88c2b6eac839
## Get-SystemExecAuthenticodeSignature
Get-SystemExecAuthenticodeSignature checks both the system32 and SysWOW64 system directories for unsigned binaries. Unsigned binaries in these folders can be evidence of abusing the `admin$` share to move laterally around the environment by an advisary. Unsigned binaries should be investigated for their legitimacy.
## Get-TriageForensics
Uses available PowerShell modules to collect forensic data from a host. The data is used to triage the machine, determine if there is a true incident and if further investigation is required on that host.