☆170Nov 3, 2025Updated 5 months ago
Alternatives and similar repositories for IRM
Users that are interested in IRM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Incident Response Methodologies 2022☆1,113Apr 11, 2025Updated last year
- Virus cleaning station/gateway☆64Apr 2, 2026Updated 2 weeks ago
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆346Updated this week
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆527Jul 31, 2024Updated last year
- ☆98Jun 22, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Mapping the information system / Cartographie du système d'information☆502Updated this week
- Hardening Active Directory version 2☆386Dec 10, 2025Updated 4 months ago
- A centralized and enhanced memory analysis platform☆524Mar 20, 2026Updated 3 weeks ago
- Cerberus is a Python client-server program to implement a complex port knocking system preventing playback attacks on an exposed server.☆74Jul 16, 2024Updated last year
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆36Feb 2, 2022Updated 4 years ago
- Protect your data in minutes !☆125Nov 5, 2024Updated last year
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆279Jan 6, 2026Updated 3 months ago
- Speed up your pentest enumeration☆83Oct 5, 2025Updated 6 months ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆33Mar 9, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Mar 5, 2026Updated last month
- Timeline of Active Directory changes with replication metadata☆522Mar 21, 2025Updated last year
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆131Dec 15, 2025Updated 4 months ago
- Sigma rules converted for direct use with Zircolite☆14Apr 9, 2026Updated last week
- AzureKitty is an Office 365 and Azure configuration audit tool☆15Jan 28, 2024Updated 2 years ago
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Nov 15, 2025Updated 5 months ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Nov 25, 2022Updated 3 years ago
- ☆13Jan 5, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,941Updated this week
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆280Updated this week
- Fully featured and community-driven hacking environment☆2,974Apr 9, 2026Updated last week
- ☆18Jan 18, 2022Updated 4 years ago
- ☆10Jan 18, 2023Updated 3 years ago
- Guide journalisation Microsoft☆70Feb 23, 2026Updated last month
- Outil de triage automatisé de différents types de collectes d'artefacts.☆18Dec 8, 2025Updated 4 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆74Updated this week
- Root-me Hall Of Fame dashboard☆14Mar 30, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Forensics artefact collection tool for systems running Microsoft Windows☆434Mar 26, 2025Updated last year
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆51Sep 6, 2023Updated 2 years ago
- Image pour l'installation d'une station Linux Debian dédiée au scan antivirus de clé USB☆17May 22, 2024Updated last year
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated last year
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆148Apr 21, 2025Updated 11 months ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆290Apr 9, 2026Updated last week