NC3-LU / Fit4CybersecurityLinks
A self-assessment tool by @NC3-LU to help business owners implement a better cybersecurity strategy.
☆25Updated 3 months ago
Alternatives and similar repositories for Fit4Cybersecurity
Users that are interested in Fit4Cybersecurity are comparing it to the libraries listed below
Sorting:
- AIL project training materials☆35Updated last month
- Virtual Security Operations Center☆51Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆21Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 3 weeks ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆19Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆20Updated 5 months ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- URL fingerprinting made easy☆89Updated last year
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated this week
- Shodan Monitoring integration for TheHive.☆131Updated 8 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 weeks ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Collection of Dashboards for Threat Hunting and more!☆68Updated 4 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- ☆19Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year
- Hashes of infamous malware☆26Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆35Updated 2 months ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- Recent cyber attacks reports & interesting analysis files☆15Updated 3 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year