WedgeTheJedi / First-Wave-ISAC-BeaconLinks
Files and software to create the First Wave ISAC Beacon cosplay prop from Tom Clancy's The Division
☆15Updated 2 years ago
Alternatives and similar repositories for First-Wave-ISAC-Beacon
Users that are interested in First-Wave-ISAC-Beacon are comparing it to the libraries listed below
Sorting:
- Malware Simulator - Pretend a malware infection by creating a text file into several locations on the local system and also in the networ…☆26Updated 7 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 10 years ago
- VMware Snapshot Forensic Comparison Scripts☆25Updated 12 years ago
- Carbonblack Live Response from the comfort of your own terminal☆20Updated 9 years ago
- Cross-platform, open-source shellbag parser☆151Updated 2 years ago
- SmartResponse plugin development.☆15Updated 5 years ago
- Modified edition of cuckoo☆18Updated 7 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- CRITs Services Collection☆184Updated 4 years ago
- Page File analysis tools.☆128Updated 9 years ago
- Kill Chain Matrix -->>☆38Updated 6 years ago
- A curated list of awesome malware analysis tools and resources☆82Updated 9 years ago
- ☆200Updated 3 years ago
- To parse ugly Microsoft DNS Logs....☆41Updated 7 years ago
- Sysmon configuration file template with default high-quality event tracing☆17Updated 4 years ago
- Tools from WFA 4/e, timeline tools, etc.☆141Updated last year
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆148Updated 11 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆52Updated 9 years ago
- FW for ESP8266/ESP8285/ESP32 used with 3D printer☆1,858Updated last month
- CRITs - Collaborative Research Into Threats☆21Updated 6 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆187Updated last year
- Python script to batch query the Tor Relays and Bridges☆36Updated 6 years ago
- An IOC framework written in PowerShell☆19Updated 8 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆67Updated 4 years ago
- Custom Queries, Dashboards, and HIPs Rules☆10Updated 7 years ago
- Kirjuri is a web application for managing cases and physical forensic evidence items.☆107Updated 4 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Updated 9 years ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆93Updated 6 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 5 years ago