Public Landing Page
☆16Jan 7, 2023Updated 3 years ago
Alternatives and similar repositories for info
Users that are interested in info are comparing it to the libraries listed below
Sorting:
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- ☆34Nov 16, 2023Updated 2 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆22Sep 19, 2020Updated 5 years ago
- ☆28Nov 25, 2025Updated 3 months ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆35Feb 1, 2022Updated 4 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week
- ☆10Feb 20, 2017Updated 9 years ago
- AuditParser☆60Aug 28, 2013Updated 12 years ago
- Yara rules☆49Jan 28, 2014Updated 12 years ago
- Security Onion Elastic Stack☆46Feb 1, 2021Updated 5 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- TinyCircuits TinyDuino Processor Board, Model ASM2001☆22Aug 18, 2020Updated 5 years ago
- On Premise Installer☆14Apr 7, 2021Updated 4 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- 🌦️ Domain Ranker☆16Sep 7, 2019Updated 6 years ago
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- ☆10Jan 22, 2025Updated last year
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- Collection of Thorrak's PCBs☆10Apr 16, 2025Updated 10 months ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- This module is used to report phishing URLs to their WHOIS/RDAP abuse contact information.☆42Jul 30, 2017Updated 8 years ago
- Python passive host discovery script☆11Mar 30, 2025Updated 11 months ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- C# Process Hollowing POC☆18Jan 5, 2023Updated 3 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆20Mar 16, 2022Updated 3 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆62Jun 9, 2025Updated 8 months ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 7 years ago
- Source code for the experimental, compact "wee" file compression utility.☆13May 8, 2020Updated 5 years ago
- OS Lockdown☆13Nov 21, 2017Updated 8 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- ☆17Jul 16, 2024Updated last year