☆168Nov 3, 2025Updated 4 months ago
Alternatives and similar repositories for IRM
Users that are interested in IRM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Incident Response Methodologies 2022☆1,107Apr 11, 2025Updated 11 months ago
- Virus cleaning station/gateway☆63Mar 10, 2026Updated 2 weeks ago
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆341Mar 18, 2026Updated last week
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆528Jul 31, 2024Updated last year
- ☆98Jun 22, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Mapping the information system / Cartographie du système d'information☆500Mar 20, 2026Updated last week
- Hardening Active Directory version 2☆380Dec 10, 2025Updated 3 months ago
- A centralized and enhanced memory analysis platform☆522Updated this week
- Cerberus is a Python client-server program to implement a complex port knocking system preventing playback attacks on an exposed server.☆74Jul 16, 2024Updated last year
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆36Feb 2, 2022Updated 4 years ago
- Protect your data in minutes !☆125Nov 5, 2024Updated last year
- Speed up your pentest enumeration☆82Oct 5, 2025Updated 5 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Mar 5, 2026Updated 3 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆129Dec 15, 2025Updated 3 months ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- AzureKitty is an Office 365 and Azure configuration audit tool☆15Jan 28, 2024Updated 2 years ago
- Outil de sécurité des architectures kubernetes avancées☆82Nov 27, 2025Updated 3 months ago
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Nov 15, 2025Updated 4 months ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Nov 25, 2022Updated 3 years ago
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,679Mar 20, 2026Updated last week
- ☆13Jan 5, 2026Updated 2 months ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆278Mar 14, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Fully featured and community-driven hacking environment☆2,960Updated this week
- ☆18Jan 18, 2022Updated 4 years ago
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 6 months ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆18Dec 8, 2025Updated 3 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆74Updated this week
- Root-me Hall Of Fame dashboard☆14Mar 30, 2023Updated 2 years ago
- Forensics artefact collection tool for systems running Microsoft Windows☆434Mar 26, 2025Updated last year
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆51Sep 6, 2023Updated 2 years ago
- Data-Shield IPv4 Blocklist Community provides an official, curated registry of IPv4 addresses identified as malicious. Updated continuous…☆445Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Image pour l'installation d'une station Linux Debian dédiée au scan antivirus de clé USB☆17May 22, 2024Updated last year
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated 11 months ago
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆147Apr 21, 2025Updated 11 months ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆289Oct 17, 2023Updated 2 years ago
- DFIRLab / Plateforme d'investigation numérique☆15Jul 6, 2021Updated 4 years ago
- A user-friendly solution to transfer files through a physical diode using the Lidi utility, complete with data retention, file history, u…☆154Feb 6, 2026Updated last month