Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigations.
☆38Mar 15, 2024Updated 2 years ago
Alternatives and similar repositories for cont3xt
Users that are interested in cont3xt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The website for arkime.com☆24Updated this week
- ☆12Apr 23, 2020Updated 5 years ago
- Burp Suite extension to log GraphQL operations as a comment☆23Aug 9, 2021Updated 4 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- PowerShell script useful for Incident Response and security/configuration baselines for Windows Vista and later☆20Feb 23, 2016Updated 10 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago
- Golang Tool to interact with Launchd and other services with XPC☆29May 7, 2020Updated 5 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- osquery query packs☆14Aug 31, 2018Updated 7 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Automatically create iSCSI targets for all drives except for a boot device☆25May 23, 2025Updated 10 months ago
- Learning Python for Forensics, Second Edition, Published by Packt☆11Apr 5, 2019Updated 6 years ago
- Ansible playbook automation for pfelk☆23Jan 11, 2022Updated 4 years ago
- Documentation for ROCK NSM☆27Apr 7, 2021Updated 4 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- ForensicArtifacts.com Artifact Repository☆12Feb 11, 2026Updated last month
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- Jupyter demo repository for PancakesCon2020☆16Mar 23, 2020Updated 6 years ago
- A repository of output using KAPE (!EZParser Module) for various publicly available forensic images!☆17Aug 31, 2024Updated last year
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- Simple script to convert JSON to html or excel☆23Jun 10, 2020Updated 5 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 2 years ago
- Android application penetration testing for the masses.☆13Apr 12, 2019Updated 6 years ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- ☆64Feb 12, 2022Updated 4 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆43Nov 27, 2022Updated 3 years ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- ☆134Apr 12, 2021Updated 4 years ago
- Evolution of Discrete data with Reinforcement Learning☆13Dec 8, 2019Updated 6 years ago