PiRogueToolSuite / colander
Case, knowledge management and digital investigation platform
☆20Updated last week
Alternatives and similar repositories for colander:
Users that are interested in colander are comparing it to the libraries listed below
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆59Updated 4 months ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆81Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 2 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆75Updated 3 months ago
- ☆13Updated 8 months ago
- An open source platform to support analysts to organise their case and tasks☆66Updated last week
- Cyber Underground General Intelligence Requirements☆90Updated last year
- ☆42Updated 4 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 2 months ago
- ☆84Updated last week
- ☆15Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆24Updated last month
- ☆124Updated 2 weeks ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated last year
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated last month
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- Python based CLI for MalwareBazaar☆36Updated 3 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆65Updated last year
- Forensic Artifact Collection Tool Matrix☆82Updated 3 months ago
- The core backend server handling API requests and task management☆35Updated last week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated last week
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆36Updated last week
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Updated 3 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated last year
- CSIRT Jump Bag☆27Updated 9 months ago
- Rules shared by the community from 100 Days of YARA 2024☆83Updated last month
- ☆29Updated this week
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆21Updated 10 months ago