WithSecureLabs / KanvasLinks
A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.
☆217Updated last week
Alternatives and similar repositories for Kanvas
Users that are interested in Kanvas are comparing it to the libraries listed below
Sorting:
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆170Updated 5 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆218Updated last month
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆434Updated this week
- Analyze pcaps with Zeek and a Grafana Dashboard☆178Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆317Updated this week
- ☆262Updated 7 months ago
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆125Updated last month
- Bitor Scanning Software☆387Updated 2 weeks ago
- An index of publicly available and open-source threat detection rulesets.☆118Updated 2 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆259Updated last month
- Mapping of open-source detection rules and atomic tests.☆169Updated 5 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆243Updated this week
- VirtualGHOST Detection Tool☆91Updated last year
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆87Updated 5 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 11 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆108Updated 9 months ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 9 months ago
- Knowledge base on cybercriminal concealment techniques☆72Updated 2 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆171Updated last month
- LotL RMM☆217Updated 3 weeks ago
- Open Source SIEM Stack☆98Updated 4 months ago
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆282Updated last week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆81Updated 3 weeks ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆134Updated this week
- Convert Sigma rules to SIEM queries, directly in your browser.☆91Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated 3 weeks ago
- DFIR ORC PARSER PROJECT☆25Updated 4 months ago
- SOCFortress CoPilot☆296Updated this week
- God Mode Detection Rules☆134Updated 11 months ago