VIGINUM-FR / Rapports-TechniquesView external linksLinks
Rapports techniques de VIGINUM
☆36Sep 15, 2025Updated 5 months ago
Alternatives and similar repositories for Rapports-Techniques
Users that are interested in Rapports-Techniques are comparing it to the libraries listed below
Sorting:
- ☆23Apr 11, 2024Updated last year
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- ☆18Jan 31, 2025Updated last year
- Modèle macro-économique Mésange☆17Feb 20, 2023Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 7 months ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆24Nov 20, 2025Updated 2 months ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 2 months ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Apr 14, 2025Updated 10 months ago
- ☆23Sep 20, 2024Updated last year
- BreizhCTF 2023 - Challenges☆27Mar 23, 2023Updated 2 years ago
- crypto-condor is a Python library for compliance testing of implementations of cryptographic primitives☆33Oct 6, 2025Updated 4 months ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 2 months ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆33Updated this week
- 🦊 DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.☆50Jul 21, 2025Updated 6 months ago
- ☆23May 19, 2019Updated 6 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- ☆29Jan 31, 2025Updated last year
- Dynamic binary translator for x86 binaries☆38Apr 7, 2023Updated 2 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Apr 1, 2024Updated last year
- ☆32May 14, 2018Updated 7 years ago
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 3 years ago
- Powershell Linter☆87Feb 6, 2026Updated last week
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆72Oct 24, 2025Updated 3 months ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- ☆30Jan 13, 2026Updated last month
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Oct 21, 2025Updated 3 months ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆33Apr 2, 2024Updated last year
- Visualize your Terraform files☆34Sep 9, 2020Updated 5 years ago