cisagov / CHIRPLinks
A DFIR tool written in Python.
☆1,049Updated 3 years ago
Alternatives and similar repositories for CHIRP
Users that are interested in CHIRP are comparing it to the libraries listed below
Sorting:
- A Simple Ransomware Vaccine☆964Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,463Updated 10 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,268Updated 2 years ago
- Storage Explorer - Publicly open storage viewer (Amazon S3 Bucket, Azure Blob, FTP server, HTTP Index Of/)☆445Updated last year
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,422Updated 2 years ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆927Updated this week
- ☆319Updated 3 years ago
- ☆560Updated 2 years ago
- CrackQ: A Python Hashcat cracking queue system☆938Updated 9 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,180Updated 3 weeks ago
- Understand adversary tradecraft and improve detection strategies☆709Updated 2 years ago
- Python library to carry out DFIR analysis on the Cloud☆481Updated 2 weeks ago
- SunBurst DGA Decode Script☆207Updated 4 years ago
- Malware analysis platform☆442Updated last year
- Pack up to 3MB of data into a tweetable PNG polyglot file.☆2,560Updated 3 years ago
- Fetch information about a public Google document.☆886Updated last year
- ☆2,662Updated last year
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆796Updated last year
- ☆626Updated 2 years ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,405Updated 8 months ago
- Attack Surface Management since before Attack Surface Management was a thing☆644Updated this week
- A knowledge base of actionable Incident Response techniques☆639Updated 3 years ago
- Collect information of Windows PC when doing incident response☆253Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆852Updated 3 years ago
- A query aggregator for OSINT based threat hunting☆899Updated this week
- Cybersecurity Evaluation Tool☆1,568Updated last week
- An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments…☆1,707Updated last month
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Updated last year
- Automated Red Team Infrastructure deployement using Docker☆1,243Updated 2 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,355Updated 3 months ago