USB key cleaner
☆480May 24, 2023Updated 2 years ago
Alternatives and similar repositories for Circlean
Users that are interested in Circlean are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python library used by CIRCLean (the USB sanitizer) and others☆54Jan 5, 2024Updated 2 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆148Dec 8, 2022Updated 3 years ago
- USB key cleaner☆62Oct 26, 2017Updated 8 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,366Updated this week
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆440Feb 24, 2023Updated 3 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,428Nov 16, 2023Updated 2 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Mar 10, 2025Updated last year
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆269Jun 15, 2021Updated 4 years ago
- Scanning pastebin with yara rules☆1,130Jan 10, 2026Updated 2 months ago
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Jun 25, 2024Updated last year
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- Incident Response Methodologies☆1,018Aug 2, 2018Updated 7 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,117Feb 14, 2026Updated last month
- Automater - IP URL and MD5 OSINT Analysis☆553Aug 13, 2024Updated last year
- ☆17Oct 5, 2020Updated 5 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Binary analysis and management framework☆1,556Jun 7, 2023Updated 2 years ago
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 8 years ago
- A list of published research documents☆248Jul 10, 2024Updated last year
- Loki - Simple IOC and YARA Scanner☆3,735Jan 12, 2026Updated 2 months ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- Lootbox downloads open directories shared on Twitter.☆35Mar 28, 2021Updated 5 years ago
- Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features.☆3,085Aug 10, 2025Updated 7 months ago
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated last year
- Network Security Monitoring on Raspberry Pi type devices☆793Feb 9, 2018Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆737Feb 5, 2019Updated 7 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,295Jul 10, 2024Updated last year
- A curated list of awesome Security Hardening techniques for Windows.☆1,788Jan 7, 2020Updated 6 years ago
- A collection of sources of indicators of compromise.☆957May 8, 2025Updated 10 months ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆509Jul 13, 2022Updated 3 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago