Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.
☆21Mar 6, 2023Updated 3 years ago
Alternatives and similar repositories for hikeshi
Users that are interested in hikeshi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Use Airflow to pull in remote data via API, pub/sub, kinesis, s3 etc. and then store it in s3 for later consumption by other services.☆13Mar 14, 2022Updated 4 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Site Reliability Engineering / DevOps SaltStack configuration files☆29Feb 24, 2026Updated last month
- ☆11Mar 18, 2026Updated last week
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Leetcode solutions☆15Dec 24, 2025Updated 3 months ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- Official Malice Plugins☆21Nov 26, 2018Updated 7 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Apr 6, 2022Updated 3 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- A Splunk app to use MISP in background☆112Jan 8, 2026Updated 2 months ago
- ☆22Mar 14, 2024Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- File indexer with semantic search, hybrid retrieval, and multi-step reasoning agents☆20Jan 17, 2026Updated 2 months ago
- ☆24Mar 8, 2017Updated 9 years ago
- Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security communit…☆28Dec 17, 2025Updated 3 months ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆36Aug 26, 2020Updated 5 years ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Mar 25, 2024Updated 2 years ago
- An alarm callback plugin for executing a script on Graylog2's server.☆11Apr 23, 2016Updated 9 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 9 months ago
- Unofficial. Splunk MCP server. Implemented in Python and TypeScript/JS. Runs searches, queries Splunk, and outputs data as JSON, CSV, or …☆29Jun 16, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Codebase for VideoConviction, accepted at KDD 2025 (D&B Track)☆18Jan 22, 2026Updated 2 months ago
- 🔑 Simple MinIO access and secret key generator☆36Dec 19, 2021Updated 4 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- Minimal Docker image with Nmap Network Security Scanner pre-installed.☆12Dec 5, 2025Updated 3 months ago
- A series of tutorials and sketches pulled from various sources and modified for the Thotcon 0xA conference badge.☆15May 3, 2019Updated 6 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- Time-locked encryption vault with Dead Man's Switch. Send encrypted messages that unlock at a specific date or auto-release if you go sil…☆50Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Reads and prints information from the website MalAPI.io☆39Jan 18, 2022Updated 4 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆38Feb 12, 2016Updated 10 years ago
- ☆10Jun 11, 2022Updated 3 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- The okta-aws-cli-assume-role auth tool for humans☆13Jun 5, 2025Updated 9 months ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140May 23, 2023Updated 2 years ago