PiRogueToolSuite / colanderLinks
Case, knowledge management and digital investigation platform
☆29Updated last week
Alternatives and similar repositories for colander
Users that are interested in colander are comparing it to the libraries listed below
Sorting:
- Website for ail-typo-squatting library☆66Updated 2 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Updated last month
- An open source platform to support analysts to organise their case and tasks☆114Updated this week
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 5 months ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Updated 2 years ago
- A YARA & Malware Analysis Toolkit written in Rust.☆78Updated 2 months ago
- List of past and future infosec related events.☆165Updated this week
- Cyber Underground General Intelligence Requirements☆96Updated last year
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆112Updated 2 weeks ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆114Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆123Updated last week
- Sniffing out well-known threat groups☆64Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Can you pay the ransom in your country?☆14Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 7 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 10 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆96Updated 2 weeks ago
- Turn any blog into structured threat intelligence.☆42Updated last week
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 7 months ago
- AIL project training materials☆38Updated 4 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- Building a consolidated RSS feed for articles about cyberattacks☆72Updated this week
- Examine Chrome extensions for security issues☆88Updated 3 weeks ago
- Tor onion address lookup☆57Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆96Updated this week
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated 3 months ago
- ☆21Updated last month