TobySalusky / cont3xt
Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigations.
☆37Updated 11 months ago
Alternatives and similar repositories for cont3xt:
Users that are interested in cont3xt are comparing it to the libraries listed below
- ☆28Updated last month
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- ☆26Updated 3 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆41Updated 10 months ago
- ☆21Updated 3 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- ☆24Updated 2 years ago
- Windows Security Logging☆43Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- CSIRT Jump Bag☆27Updated 9 months ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated last week
- Converting data from services like Censys and Shodan to a common data model☆49Updated 5 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated 2 weeks ago
- Hashes of infamous malware☆25Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Website crawler with YARA detection☆88Updated last year
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆59Updated this week
- Automatic detection engineering technical state compliance☆54Updated 7 months ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Logbook for Digital Forensics and Incident Response☆50Updated 7 months ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago