NorthernSec / WebImportLinks
Import python libraries over HTTP
☆13Updated 7 months ago
Alternatives and similar repositories for WebImport
Users that are interested in WebImport are comparing it to the libraries listed below
Sorting:
- CSIRT Jump Bag☆26Updated last year
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆42Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 6 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 3 years ago
- Python library for threat intelligence☆86Updated 4 months ago
- Digital Forensics Artifacts Knowledge Base☆81Updated last year
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- Hunt malware with Volatility☆47Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆59Updated last week
- A rewrite of mactime, a bodyfile reader☆37Updated 10 months ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago
- ☆28Updated 4 months ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Updated 2 years ago
- ☆77Updated 5 years ago
- ☆35Updated 7 months ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- Recon Hunt Queries☆77Updated 4 years ago
- Site for IWS book content☆18Updated 6 years ago
- Volatility plugins created by the author☆44Updated 9 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago