Information-Warfare-Center / CSI-SIEMView external linksLinks
CSI SIEM
☆109Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for CSI-SIEM
Users that are interested in CSI-SIEM are comparing it to the libraries listed below
Sorting:
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Jan 15, 2022Updated 4 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Maltego transformation for searching of accounts by username☆79Feb 15, 2022Updated 4 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Nov 30, 2025Updated 2 months ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆658May 4, 2023Updated 2 years ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆461Nov 20, 2024Updated last year
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆212Aug 8, 2023Updated 2 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 5 months ago
- ☆25Aug 11, 2020Updated 5 years ago
- ☆42Dec 8, 2022Updated 3 years ago
- Search and extract blob files on the Ethereum Blockchain network☆44Apr 3, 2021Updated 4 years ago
- Run a base query (plus optional add-ons) through ask, bing, brave, duck duck go, yahoo, and yandex.☆25Feb 26, 2023Updated 2 years ago
- Framework for Telegram users and chats investigating☆74Jun 5, 2025Updated 8 months ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Jun 25, 2014Updated 11 years ago
- ☆69May 3, 2021Updated 4 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆14Jul 19, 2025Updated 6 months ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆14Jul 15, 2025Updated 7 months ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- TIGMINT: OSINT (Open Source Intelligence) GUI software framework☆245Jul 29, 2021Updated 4 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆127Apr 6, 2024Updated last year
- Trace Labs OSINT Linux Distribution based on Kali.☆789Aug 20, 2023Updated 2 years ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- SIEM Tactics, Techiques, and Procedures☆696Feb 3, 2026Updated last week
- ☆47Jan 1, 2018Updated 8 years ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆36Dec 28, 2024Updated last year
- ☆28Jun 18, 2019Updated 6 years ago
- Web Service write in Python for control and protect your android device remotely.☆190Dec 14, 2022Updated 3 years ago
- ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses☆399Aug 7, 2025Updated 6 months ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Jan 23, 2025Updated last year