Defensomania is a security monitoring and incident response card game.
☆65May 24, 2023Updated 2 years ago
Alternatives and similar repositories for Defensomania
Users that are interested in Defensomania are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- Security Monitoring Resolution Categories☆137Nov 25, 2021Updated 4 years ago
- ☆14May 30, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆40Mar 18, 2022Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Basic log analysis tool to detect impossible travel via IP address geographic information☆20Apr 29, 2019Updated 6 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 10 months ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- A training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessmen…☆19Sep 29, 2017Updated 8 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆80Jul 29, 2022Updated 3 years ago
- An online tool for building a thorough and well-supported Code of Conduct specific to a community's online and/or offline environment.☆20May 27, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A simple script to read the contents of a zip/tar/folder and extract metadata☆22Mar 18, 2026Updated last week
- Open KLara Project☆36Feb 12, 2026Updated last month
- A script to generate the Hackers Against Humanity deck.☆13Jan 21, 2024Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆186Oct 3, 2025Updated 5 months ago
- Password management and cracking training☆13Jul 15, 2025Updated 8 months ago
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago
- ☆49Jan 13, 2020Updated 6 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated last year
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated 11 months ago
- ☆152Jun 5, 2024Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Automatically spin up infra for phishing☆63Feb 1, 2020Updated 6 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- incident response tool for iOS devices☆51Apr 27, 2022Updated 3 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Windows Events Attack Samples☆2,531Jan 24, 2023Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- DFIRTrack - The Incident Response Tracking Application☆534Jan 13, 2026Updated 2 months ago
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- Smart piping of command output to email for alerting.☆20May 14, 2020Updated 5 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Mar 20, 2026Updated last week