PiRogueToolSuite / colanderLinks
Case, knowledge management and digital investigation platform
☆29Updated this week
Alternatives and similar repositories for colander
Users that are interested in colander are comparing it to the libraries listed below
Sorting:
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆122Updated last week
- Rapports techniques de VIGINUM☆36Updated 2 months ago
- An open source platform to support analysts to organise their case and tasks☆110Updated last week
- Website for ail-typo-squatting library☆67Updated last month
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆33Updated last month
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆162Updated last week
- USB Scanning device☆30Updated 2 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 11 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 4 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Updated 2 years ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆45Updated last week
- A YARA & Malware Analysis Toolkit written in Rust.☆56Updated last month
- Tor onion address lookup☆56Updated 3 months ago
- ☆47Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- Examine Chrome extensions for security issues☆87Updated last week
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 9 months ago
- List of past and future infosec related events.☆165Updated this week
- Cyber Underground General Intelligence Requirements☆96Updated last year
- God Mode Detection Rules☆134Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 7 months ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆112Updated 2 weeks ago
- Repository that contains a set of purposefully erroneous Yara rules.☆60Updated 4 months ago
- DEbian Cve REproducer Tool☆27Updated 3 months ago
- Sandbox samples and monitor them with kunai☆29Updated 4 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated last year
- AIL project training materials☆37Updated 4 months ago
- ☆99Updated 3 weeks ago