Workflows for Shuffle
☆24Oct 26, 2022Updated 3 years ago
Alternatives and similar repositories for workflows
Users that are interested in workflows are comparing it to the libraries listed below
Sorting:
- Swagger/ OpenAPI specifications for security products and services☆77Feb 9, 2026Updated 2 weeks ago
- Documentation used for Shuffle☆21Feb 19, 2026Updated last week
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆123Feb 20, 2026Updated last week
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆129Jan 9, 2023Updated 3 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Threat Analytics Search Chrome Extension☆12Updated this week
- The NIST Open Access to Research (OAR) Public Data Repository (PDR) system software☆14Jan 4, 2026Updated last month
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Command line $MFT record decoder☆12May 20, 2017Updated 8 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆24Jan 15, 2026Updated last month
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Dec 29, 2025Updated last month
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 4 years ago
- Gather domains as a precursor to scanning☆21Feb 18, 2026Updated last week
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Create Logstash events from the Okta API!☆19Nov 29, 2022Updated 3 years ago
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 8 months ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- Extract files off NTFS☆22Nov 1, 2014Updated 11 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- Makes files super hidden on NTFS☆19Aug 14, 2014Updated 11 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆22Apr 16, 2021Updated 4 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- A BurpSuite extension for lair☆28Oct 18, 2017Updated 8 years ago
- Automate your SOC with SEKOIA.IO's Automation Library. Pull Requests are always welcome and highly appreciated!☆21Feb 20, 2026Updated last week
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- Collaborative, web-based case management for incident response☆24Jan 23, 2024Updated 2 years ago