Rapports techniques de VIGINUM
☆36Sep 15, 2025Updated 6 months ago
Alternatives and similar repositories for Rapports-Techniques
Users that are interested in Rapports-Techniques are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Apr 11, 2024Updated last year
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆35Updated this week
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated last week
- bibliographie cyber publique du M82_project☆21Oct 18, 2025Updated 5 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- OpenCTI Documentation Space☆26Dec 18, 2025Updated 3 months ago
- ☆11Apr 7, 2022Updated 3 years ago
- A Python script and executable for simulating the GPS location of an iOS 17 device connected to your computer using pymobiledevice3. Prov…☆12Jan 10, 2024Updated 2 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 6 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 3 months ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Apr 1, 2024Updated last year
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆23May 19, 2019Updated 6 years ago
- Powershell/Javascript deobfuscator based on tree-sitter☆93Mar 23, 2026Updated last week
- ☆25Jul 5, 2018Updated 7 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 6 months ago
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆25Nov 20, 2025Updated 4 months ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated last year
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Mar 17, 2026Updated last week
- Dark Light Viewer - a tool to conduct change detection over time using VIIRS night lights data.☆37Mar 3, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆49Mar 18, 2026Updated last week
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆98Jun 4, 2025Updated 9 months ago
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- ☆19Jan 31, 2025Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆33Mar 9, 2022Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An patch porting qwingraph (wingraph written in qt4) to qt5.☆10Aug 21, 2019Updated 6 years ago
- Cleanup of older MISP events can require some work until now☆28Sep 13, 2025Updated 6 months ago
- Various Write Ups from OverTheWire, TryHackMe, HackTheBox, CrackMes.one and more!☆12Dec 25, 2022Updated 3 years ago
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- Script examples - Bash, PowerShell, etc.☆16Jan 1, 2025Updated last year
- BreizhCTF 2023 - Challenges☆25Mar 23, 2023Updated 3 years ago
- CLI generator for Velociraptor offline collector☆16Mar 6, 2026Updated 3 weeks ago