Bre77 / hibpLinks
☆16Updated 5 months ago
Alternatives and similar repositories for hibp
Users that are interested in hibp are comparing it to the libraries listed below
Sorting:
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆147Updated last year
- Collection of useful Canary tools☆84Updated last month
- ☆87Updated last month
- Unleash the power of the Falcon Platform at the CLI☆121Updated 3 weeks ago
- ☆119Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆42Updated 3 years ago
- Awesome Incident Response☆275Updated last year
- Repo for Concierge AI dev work☆196Updated this week
- ☆77Updated 2 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆239Updated 3 weeks ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆108Updated 9 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- InsightVM helpful SQL queries☆69Updated 5 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆180Updated last year
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆82Updated last month
- Elevate your Security Operations Center's efficiency with Howler, the cutting-edge alert triage platform tailored for today's SOC demands…☆25Updated this week
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 9 months ago
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆257Updated last year
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 10 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆172Updated 5 months ago
- Data Driven Threat Hunting on the RaspberryPi☆29Updated 3 years ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆220Updated last month
- A collection of scripts for use with CrowdStrike Falcon RTR☆17Updated 9 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 6 months ago
- NIST CSF Maturity Toolkit☆44Updated last month
- Sample programs to access the API☆88Updated 3 months ago
- Corelight@Home script☆42Updated last year
- List of past and future infosec related events.☆158Updated last week
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆79Updated 2 weeks ago
- Tools and scripts by Arctic Wolf☆69Updated 2 weeks ago