The Seeker of IOC
☆131Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for certitude
Users that are interested in certitude are comparing it to the libraries listed below
Sorting:
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆61May 8, 2017Updated 8 years ago
- ☆519Jan 26, 2021Updated 5 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Incident Response Forensic Framework☆611Nov 20, 2019Updated 6 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Sep 21, 2017Updated 8 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Nov 3, 2025Updated 3 months ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- 16,432 Free Yara rules created by☆390Jun 1, 2019Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 6 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Splunk Boss of the SOC v1 data set.☆113Jun 13, 2018Updated 7 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Sandia Cyber Omni Tracker (SCOT)☆253Nov 4, 2024Updated last year
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,362Feb 23, 2026Updated last week
- Python and Machine Learning Workshop at Hack.lu 2017☆82May 18, 2018Updated 7 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- Fast Incident Response☆1,995Feb 17, 2026Updated last week
- Powershell-based Windows Security Auditing Toolbox☆573Jan 9, 2019Updated 7 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 6 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 8 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- Exploit the credentials present in files and memory☆843May 25, 2023Updated 2 years ago
- Queries to parse sysmon event log file with microsoft logparser☆58Mar 31, 2015Updated 10 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and fir…☆40Dec 5, 2017Updated 8 years ago