Rapports techniques de VIGINUM
☆36Sep 15, 2025Updated 7 months ago
Alternatives and similar repositories for Rapports-Techniques
Users that are interested in Rapports-Techniques are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 9 months ago
- 🦊 DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.☆51Jul 21, 2025Updated 8 months ago
- OpenCTI Documentation Space☆26Dec 18, 2025Updated 4 months ago
- ☆11Apr 7, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Augmentation to Machine Readable CTI☆39Sep 9, 2025Updated 7 months ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 7 months ago
- Translate srt subtitles through Google Translation API☆16Apr 20, 2018Updated 7 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Master copies of the DISARM frameworks, with generated files to help you explore the data☆267Mar 28, 2026Updated 3 weeks ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- Modèle macro-économique Mésange☆17Feb 20, 2023Updated 3 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆25Nov 20, 2025Updated 4 months ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Updated this week
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Mar 18, 2026Updated last month
- Quels élus de la République (députés, ministres, maires) utilisent toujours x.com ?☆14Feb 8, 2026Updated 2 months ago
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- ☆19Jan 31, 2025Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆33Mar 9, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆30Dec 21, 2023Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆99Jun 4, 2025Updated 10 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated 2 months ago
- Scripts de génération des contours administratifs Etalab☆12Mar 10, 2026Updated last month
- Cleanup of older MISP events can require some work until now☆28Apr 5, 2026Updated 2 weeks ago
- Annotation de la jurisprudence des CA Fr☆12May 4, 2018Updated 7 years ago
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- Script examples - Bash, PowerShell, etc.☆16Jan 1, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Fonds de carte de qualité utilisables par tous☆12Jul 12, 2018Updated 7 years ago
- BreizhCTF 2023 - Challenges☆25Mar 23, 2023Updated 3 years ago
- CLI generator for Velociraptor offline collector☆16Mar 6, 2026Updated last month
- ☆10Dec 28, 2015Updated 10 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆37Oct 21, 2025Updated 5 months ago
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago