brittonhayes / hikeshi
Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.
☆20Updated last year
Related projects: ⓘ
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Best practices in threat intelligence☆46Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆30Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆51Updated 3 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆12Updated 4 years ago
- 🕵️ Process and show forensic artifacts (e.g. eventlogs, usb devices, network devices...) in forensicstores☆46Updated 10 months ago
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- THOR Thunderstorm Collectors☆24Updated last week
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Documentation used for Shuffle☆18Updated this week
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 6 months ago
- Python module to interact with THOR Thunderstorm service☆10Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆34Updated 5 years ago
- A MITRE ATT&CK Lookup Tool☆41Updated 4 months ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Updated 5 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Updated 4 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated 3 months ago
- Website crawler with YARA detection☆87Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated 2 weeks ago
- Threat Hunter's Knowledge Base☆21Updated 2 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Updated 2 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- ☆56Updated this week
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆47Updated 9 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆49Updated 2 years ago
- misp-cloud - Cloud-ready images of MISP☆70Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆105Updated 7 months ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated last year