Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.
☆21Mar 6, 2023Updated 3 years ago
Alternatives and similar repositories for hikeshi
Users that are interested in hikeshi are comparing it to the libraries listed below
Sorting:
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Leetcode solutions☆15Dec 24, 2025Updated 2 months ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- Official Malice Plugins☆21Nov 26, 2018Updated 7 years ago
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- ☆24Mar 8, 2017Updated 8 years ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 8 months ago
- 🔑 Simple MinIO access and secret key generator☆36Dec 19, 2021Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆36Jan 26, 2025Updated last year
- Erised Reverse Engineering and Exploitation Training Sessions☆37Feb 12, 2016Updated 10 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Apr 6, 2022Updated 3 years ago
- A Splunk app to use MISP in background☆113Jan 8, 2026Updated last month
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Minimal Docker image with Nmap Network Security Scanner pre-installed.☆12Dec 5, 2025Updated 3 months ago
- ☆13Aug 11, 2018Updated 7 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Powershell module for Microsoft Cloud App Security (MCAS)☆10Mar 19, 2021Updated 4 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- ☆14Feb 8, 2020Updated 6 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- The easiest way to embed static files into a binary file in your Golang app (no external dependencies).☆47Nov 8, 2021Updated 4 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- ☆10Jun 11, 2022Updated 3 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- ☆14Mar 5, 2021Updated 5 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆10Apr 25, 2021Updated 4 years ago
- ☆12May 4, 2023Updated 2 years ago
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- Blazescan is a linux webserver malware scanning and incident response tool, with built in support for cPanel servers, but will run on any…☆60Nov 10, 2018Updated 7 years ago
- Understanding and analyzing carrier files workshop repo☆51Dec 4, 2019Updated 6 years ago