Legal, procedural and policies document templates for operating an IRT
☆65Mar 15, 2024Updated 2 years ago
Alternatives and similar repositories for compliance
Users that are interested in compliance are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- Automated OpenDXL Output information via IntelMQ☆14Jul 20, 2017Updated 8 years ago
- A GDPR Data Protection Impact Assessment (DPIA) tool to assist organisations to evaluate data protection risks with respect to the EU's G…☆49Jul 7, 2022Updated 3 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Server-side SDK to provide a simple REST API for distribution of security information.☆17May 11, 2016Updated 9 years ago
- Automated handling of data feeds for security teams☆148Dec 31, 2025Updated 2 months ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- ☆14May 30, 2018Updated 7 years ago
- 绕过burp破解版的截止日期限制. This is a tool to bypass the cracked version of the burpsuite_pro(Larry_Lau) certification deadline through time revers…☆23May 27, 2022Updated 3 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆69Aug 7, 2020Updated 5 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated 2 months ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- A collection of Volatility Framework plugins.☆26Aug 29, 2013Updated 12 years ago
- A mapping of used malware names to commonly known family names☆63Feb 21, 2023Updated 3 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/checkout4mac☆13Oct 24, 2016Updated 9 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Jun 20, 2018Updated 7 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Bro PCAP Processing and Tagging API☆28Nov 9, 2017Updated 8 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 11 months ago
- source code and binaries related to my trainings☆20Oct 18, 2016Updated 9 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Sep 23, 2024Updated last year
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 6 months ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127May 30, 2018Updated 7 years ago
- A repository for personal information data patterns and detection for EU member states. These will be useful to understand how to best de…☆13Jul 10, 2018Updated 7 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- ☆15Nov 11, 2015Updated 10 years ago
- The Location-based WiFi Services system: A Complete Open Source Solution for Wi-Fi Beacon Stuffing Based Location-based Services☆20Dec 9, 2016Updated 9 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50May 15, 2018Updated 7 years ago
- all published scripts devloped by ahmed khlief☆20Apr 3, 2020Updated 5 years ago