☆166Nov 3, 2025Updated 4 months ago
Alternatives and similar repositories for IRM
Users that are interested in IRM are comparing it to the libraries listed below
Sorting:
- Incident Response Methodologies 2022☆1,104Apr 11, 2025Updated 10 months ago
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆337Updated this week
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆529Jul 31, 2024Updated last year
- ☆99Jun 22, 2025Updated 8 months ago
- Hardening Active Directory version 2☆377Dec 10, 2025Updated 2 months ago
- Protect your data in minutes !☆125Nov 5, 2024Updated last year
- A centralized and enhanced memory analysis platform☆520Jul 13, 2025Updated 7 months ago
- Mapping the information system / Cartographie du système d'information☆493Updated this week
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆275Jan 6, 2026Updated 2 months ago
- Outil de sécurité des architectures kubernetes avancées☆76Nov 27, 2025Updated 3 months ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆35Feb 2, 2022Updated 4 years ago
- Cerberus is a Python client-server program to implement a complex port knocking system preventing playback attacks on an exposed server.☆74Jul 16, 2024Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Mar 9, 2022Updated 3 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆129Dec 15, 2025Updated 2 months ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- Speed up your pentest enumeration☆82Oct 5, 2025Updated 5 months ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆275Feb 26, 2026Updated last week
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Feb 27, 2026Updated last week
- Guide journalisation Microsoft☆70Feb 23, 2026Updated last week
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- Timeline of Active Directory changes with replication metadata☆520Mar 21, 2025Updated 11 months ago
- Fully featured and community-driven hacking environment☆2,938Updated this week
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆17Dec 8, 2025Updated 2 months ago
- Forensics artefact collection tool for systems running Microsoft Windows☆431Mar 26, 2025Updated 11 months ago
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆13Jun 6, 2024Updated last year
- ☆13Jan 5, 2026Updated 2 months ago
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated 11 months ago
- Create your own certification authority with server certificates in a full automated way☆29Aug 29, 2025Updated 6 months ago
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆147Apr 21, 2025Updated 10 months ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆288Oct 17, 2023Updated 2 years ago
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Nov 15, 2025Updated 3 months ago
- Sigma rules converted for direct use with Zircolite☆14Feb 26, 2026Updated last week
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆63Jun 25, 2025Updated 8 months ago
- ☆11Apr 7, 2022Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- Outils ESD academy☆62May 5, 2022Updated 3 years ago
- Data-Shield IPv4 Blocklist Community provides an official, curated registry of IPv4 addresses identified as malicious. Updated continuous…☆436Feb 27, 2026Updated last week