CSIRT-MU / fimetis
Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.
☆10Updated last year
Alternatives and similar repositories for fimetis
Users that are interested in fimetis are comparing it to the libraries listed below
Sorting:
- Peekaboo Extended Email Attachment Behavior Observation Owl☆68Updated 3 months ago
- Documentation for Zeek☆50Updated this week
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆261Updated 2 years ago
- Salt States for Configuring the SIFT Workstation☆102Updated last week
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 3 weeks ago
- ☆135Updated last week
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆104Updated 11 months ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆58Updated 4 years ago
- Taranis☆63Updated 4 years ago
- Zeek package for tracking long connections to report them before they have completed.☆30Updated 3 months ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Updated 5 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆123Updated 3 years ago
- Bro script package to create JSON formatted logs to stream into data analysis systems.☆28Updated last year
- ☆22Updated last month
- Evolving directions on building the best Open Source Forensics VM☆160Updated 6 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- server for indexing and querying passive DNS observations☆46Updated last month
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 4 years ago
- ☆48Updated this week
- Extract indicators of compromise from text, including "escaped" ones.☆159Updated 5 years ago
- AssemblyLine4 documentation☆29Updated this week
- A list of OPML Security Feeds☆72Updated last month
- Automatically create YARA rules from malicious documents.☆211Updated 2 years ago
- A python wrapper around https://cve.circl.lu.☆55Updated 11 months ago
- Defensomania is a security monitoring and incident response card game.☆62Updated last year
- A website and framework for testing NIDS detection☆57Updated 3 years ago