cisagov / CHIRPLinks
A DFIR tool written in Python.
☆1,052Updated 4 years ago
Alternatives and similar repositories for CHIRP
Users that are interested in CHIRP are comparing it to the libraries listed below
Sorting:
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,521Updated last year
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,197Updated 6 months ago
- A Simple Ransomware Vaccine☆972Updated 2 years ago
- Understand adversary tradecraft and improve detection strategies☆713Updated 2 years ago
- An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments…☆1,744Updated 2 months ago
- ☆323Updated 4 years ago
- ☆563Updated 2 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,298Updated 2 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆936Updated 2 years ago
- Demisto is now Cortex XSOAR. Automate and orchestrate your Security Operations with Cortex XSOAR's ever-growing Content Repository. Pull …☆1,232Updated this week
- CrackQ: A Python Hashcat cracking queue system☆938Updated last year
- SunBurst DGA Decode Script☆205Updated 4 years ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,429Updated 2 years ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,245Updated 2 weeks ago
- Adversarial Threat Landscape for AI Systems☆1,097Updated 2 years ago
- Ongoing Infosec Deals☆112Updated last week
- Collect information of Windows PC when doing incident response☆252Updated 2 years ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,064Updated 2 weeks ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,443Updated last year
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆437Updated 2 years ago
- A community sourced list of log4j-affected software☆1,123Updated 3 years ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆586Updated last year
- A collection of red team and adversary emulation resources developed and released by MITRE.☆524Updated 4 years ago
- ☆642Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆859Updated 3 years ago
- Digital Forensics Investigation Platform☆859Updated last year
- Microsoft Threat Intelligence Security Tools☆1,917Updated last month
- A repository of curated datasets from various attacks☆702Updated this week
- All sysmon event types and their fields explained☆560Updated 4 years ago
- Detector for Log4Shell exploitation attempts☆730Updated 3 years ago