att / docker-forensicsLinks
Tools to assist in forensicating docker
☆84Updated 6 months ago
Alternatives and similar repositories for docker-forensics
Users that are interested in docker-forensics are comparing it to the libraries listed below
Sorting:
- 1-Click push forensics evidence to the cloud☆141Updated last year
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- Checks with NSRL RDS servers looking for for hash matches☆114Updated 4 years ago
- automate your MISP installs☆68Updated 5 years ago
- Python Forensic and Log Analysis GUI☆26Updated 10 years ago
- Digital Forensic Investigative Scripts☆83Updated last week
- Security Onion Elastic Stack☆46Updated 4 years ago
- misp-cloud - Cloud-ready images of MISP☆73Updated 3 years ago
- Alienvault OTX TAXII connector☆56Updated 8 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆43Updated 8 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Expert Investigation Guides☆50Updated 4 years ago
- ☆34Updated 4 years ago
- Different DFIR and CTI utilities☆37Updated 5 years ago
- Different tools, koen.vanimpe@cudeso.be☆136Updated last month
- Salt States for Configuring the SIFT Workstation☆105Updated last week
- Files vetted, and approved for public release☆53Updated last year
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Updated 4 years ago
- Specifications used in the MISP project including MISP core format☆52Updated 2 months ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- Community modules for FAME☆65Updated last month
- Threathunt details for the Solarwinds compromise☆33Updated 4 years ago
- Documentation for Zeek☆50Updated this week
- MantaRay Automated Computer Forensic Triage Tool☆63Updated 6 years ago