PiRogueToolSuite / colander
Case, knowledge management and digital investigation platform
☆20Updated this week
Alternatives and similar repositories for colander:
Users that are interested in colander are comparing it to the libraries listed below
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆30Updated last month
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆80Updated 11 months ago
- Forensic Artifact Collection Tool Matrix☆79Updated 2 months ago
- The core backend server handling API requests and task management☆33Updated 2 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- ☆13Updated 7 months ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆58Updated 3 months ago
- An open source platform to support analysts to organise their case and tasks☆64Updated this week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated 2 months ago
- ☆86Updated 5 months ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆30Updated 2 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated this week
- Rapports techniques de VIGINUM☆32Updated this week
- This aims to be a collection of tools to forensically analyze Active Directory databases☆21Updated last month
- Logbook for Digital Forensics and Incident Response☆50Updated 6 months ago
- Detection Engineering with YARA☆85Updated last year
- Cyber Underground General Intelligence Requirements☆89Updated 11 months ago
- A tool to use novel locations to extract metadata from Office documents.☆61Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆68Updated 2 months ago
- Rules shared by the community from 100 Days of YARA 2024☆83Updated 2 weeks ago
- ☆27Updated this week
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- Hunt malware with Volatility☆47Updated 8 months ago
- C2 Active Scanner☆51Updated 7 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated last year
- Web Application for domain name monitoring / alerting☆62Updated 5 months ago
- Tor onion address lookup☆34Updated 3 months ago
- ☆121Updated last week
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆31Updated 5 months ago