☆815May 24, 2017Updated 8 years ago
Alternatives and similar repositories for Fido
Users that are interested in Fido are comparing it to the libraries listed below
Sorting:
- Fast Incident Response☆1,999Mar 5, 2026Updated 2 weeks ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago
- GRR Rapid Response: remote live forensics for incident response☆5,047Feb 16, 2026Updated last month
- Laika BOSS: Object Scanning System☆751Dec 16, 2024Updated last year
- Collecting & Hunting for IOCs with gusto and style☆117Aug 9, 2018Updated 7 years ago
- Web framework that allows performing periodic syncs of data sources and performing analysis on the identified results☆2,645Jan 10, 2020Updated 6 years ago
- Distributed & real time digital forensics at the speed of the cloud☆1,202Sep 13, 2019Updated 6 years ago
- SIFT Bootstrap Script☆145Jun 20, 2017Updated 8 years ago
- Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.☆4,369Feb 11, 2021Updated 5 years ago
- A Powershell incident response framework☆1,640Nov 22, 2022Updated 3 years ago
- DEPRECATED - MozDef: Mozilla Enterprise Defense Platform☆2,167Nov 2, 2021Updated 4 years ago
- CRITs - Collaborative Research Into Threats☆911Jul 29, 2019Updated 6 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Incident Response Forensic Framework☆612Nov 20, 2019Updated 6 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆129Aug 28, 2015Updated 10 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- Honeypot Intelligence with Splunk☆255Oct 18, 2018Updated 7 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆509Jul 13, 2022Updated 3 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,427Nov 16, 2023Updated 2 years ago
- Web interface for the Volatility Memory Forensics Framework☆259Nov 21, 2017Updated 8 years ago
- Sandia Cyber Omni Tracker (SCOT)☆253Nov 4, 2024Updated last year
- Malspider is a web spidering framework that detects characteristics of web compromises.☆416Nov 4, 2022Updated 3 years ago
- ☆519Jan 26, 2021Updated 5 years ago
- an osquery fleet manager☆620Dec 8, 2022Updated 3 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Binary analysis and management framework☆1,556Jun 7, 2023Updated 2 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,859Nov 17, 2021Updated 4 years ago
- Stenographer is a packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of…☆1,800Jul 26, 2021Updated 4 years ago
- Gryffin is a large scale web security scanning platform.☆2,060Feb 12, 2021Updated 5 years ago
- Automater - IP URL and MD5 OSINT Analysis☆553Aug 13, 2024Updated last year
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Feb 3, 2026Updated last month