CERT-W / certitude
The Seeker of IOC
☆129Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for certitude
- Threat Analysis, Reconnaissance, and Data Intelligence System☆121Updated 9 years ago
- Query and report user logons relations from MS Windows Security Events☆240Updated 6 years ago
- IR-Tools - PowerShell tools for IR☆128Updated 7 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Tools for the Computer Incident Response Team☆142Updated 7 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- A powershell script for creating a Windows honeyport.☆87Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 5 years ago
- Some IR notes☆73Updated 8 years ago
- A warehouse for your malware☆133Updated 11 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- PowerShell No Agent Hunting☆108Updated 6 years ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- Malware Repository Framework☆100Updated 6 years ago
- Sandia Cyber Omni Tracker (SCOT)☆245Updated 2 weeks ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆142Updated 5 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆148Updated 6 months ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- Vulnerability Data in ES☆146Updated 7 years ago
- Automated Tactics Techniques & Procedures☆251Updated last year
- ☆59Updated 5 years ago
- Splunk Boss of the SOC v1 data set.☆111Updated 6 years ago
- ☆73Updated 6 years ago