CaliDog / tachikomaView external linksLinks
Tachikoma is a security alerting framework for human beings
☆22Sep 7, 2018Updated 7 years ago
Alternatives and similar repositories for tachikoma
Users that are interested in tachikoma are comparing it to the libraries listed below
Sorting:
- FRAC and RIFT☆17Mar 16, 2019Updated 6 years ago
- ☆20Updated this week
- ☆12May 28, 2025Updated 8 months ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 4 months ago
- ☆14Feb 27, 2018Updated 7 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- A Docker container for Moloch based on minimal Debian☆13Jun 23, 2017Updated 8 years ago
- Simple Software Vulnerability Language (SSVL)☆13Jan 21, 2015Updated 11 years ago
- Mass Triage Tools☆20Dec 16, 2025Updated 2 months ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- Go library for connecting to CertStream☆156Oct 26, 2022Updated 3 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- Apache server-status link parser☆24Jul 19, 2019Updated 6 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- SSL certificate parsing for humans☆36Jun 30, 2024Updated last year
- Real-time Packet Observation Tool☆37Sep 26, 2023Updated 2 years ago
- Rekall is an endpoint security solution.☆38Feb 12, 2018Updated 8 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Jul 8, 2019Updated 6 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 4 months ago
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- Axeman is a utility to retrieve certificates from Certificate Transparency Lists (CTLs)☆227Dec 14, 2023Updated 2 years ago
- lua scripts for dota2☆10Jul 28, 2019Updated 6 years ago
- the fastest way to consume threat intelligence.☆31Mar 9, 2023Updated 2 years ago
- PXE server with embedded TFTP, HTTP and iPXE ROMs☆43Updated this week
- Notes on managing and coordinating the response to major cyber incidents☆41May 30, 2020Updated 5 years ago
- Data Analysis Pipeline☆160Feb 13, 2025Updated last year
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Discover, setup, and get stats on network interfaces☆11Nov 17, 2023Updated 2 years ago
- Arduino project for controlling digital WWA LED strips to act as car DRL and sequential turn signals.☆12Apr 27, 2018Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆177Mar 23, 2021Updated 4 years ago
- Scripts and tools to automate a Windows 7 installation for QEMU☆13Nov 4, 2015Updated 10 years ago
- A prototype of a codetracer recorder for Ruby☆17Nov 14, 2025Updated 3 months ago
- Repo2GPT is a Python application that clones a GitHub repository and generates a tree diagram of the repository's file structure and a co…☆10Nov 21, 2025Updated 2 months ago