VIGINUM-FR / Rapports-Techniques
Rapports techniques de VIGINUM
☆32Updated last month
Alternatives and similar repositories for Rapports-Techniques:
Users that are interested in Rapports-Techniques are comparing it to the libraries listed below
- ☆19Updated 10 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 2 months ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆81Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 2 months ago
- DFIR ORC PARSER PROJECT☆25Updated last month
- The core backend server handling API requests and task management☆35Updated last week
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆36Updated last week
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆59Updated 4 months ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆50Updated 11 months ago
- CocktailParty is a data broker system based on phoenix framework☆20Updated 3 weeks ago
- A web scraper to create MISP events and reports☆14Updated 2 years ago
- ☆55Updated 4 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆12Updated 2 months ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆31Updated 6 months ago
- DEbian Cve REproducer Tool☆22Updated last year
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15Updated last year
- Summarize CTI reports with OpenAI☆13Updated this week
- Cyber Underground General Intelligence Requirements☆90Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆75Updated 3 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆49Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆24Updated last month
- C2 Active Scanner☆52Updated 8 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 7 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated last week
- AIL project training materials☆27Updated 2 weeks ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 3 months ago
- Dissect triage script for Citrix NetScaler devices☆23Updated 7 months ago
- An open source platform to support analysts to organise their case and tasks☆66Updated last week
- Configurations for DFIR ORC☆26Updated 10 months ago