counteractive / incident-response-collectorView external linksLinks
☆17Sep 9, 2020Updated 5 years ago
Alternatives and similar repositories for incident-response-collector
Users that are interested in incident-response-collector are comparing it to the libraries listed below
Sorting:
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- ☆18Mar 26, 2025Updated 10 months ago
- Gets events from the Office 365 unified audit log and outputs their details into the pipeline☆16Dec 16, 2020Updated 5 years ago
- OS X Strata builds upon Yelps OSXCollector, providing a user interface to analyze data collected from a potentially compromised system.☆14Jul 3, 2019Updated 6 years ago
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆17Oct 29, 2014Updated 11 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- WebAMS is an Open Source web application for reporting and resolving incidents or tickets☆10Dec 11, 2022Updated 3 years ago
- Serverless AWS application to upload and hash evidence files.☆23Oct 26, 2022Updated 3 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Net Zapper is a vulnerability assessment and password cracking tool written in python☆10Feb 3, 2017Updated 9 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Filters that process and transform the output of osxcollector☆77Sep 6, 2019Updated 6 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago
- End-to-End encrypted Tor2Web gateway☆38Oct 3, 2020Updated 5 years ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆48Jan 26, 2026Updated 3 weeks ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- ☆12Feb 16, 2017Updated 9 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated 3 weeks ago
- A friendly orchestrator platform from the future☆16Feb 9, 2026Updated last week
- DEV7 is a Game Engine made by I.C.E Développement for Coktel Vision☆15Feb 5, 2026Updated last week
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Cybersecurity Incident Response Plan☆109Oct 2, 2020Updated 5 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- Alex Verboon PowerShell Code☆39May 21, 2020Updated 5 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Aug 30, 2022Updated 3 years ago
- post-quantum email encryption with CodeCrypt☆11Feb 23, 2018Updated 7 years ago
- Getting up and running with Elastic Stack on Docker-Compose☆10Nov 13, 2023Updated 2 years ago
- Microsoft Defender for Cloud attack simulation toolkit☆23Dec 24, 2024Updated last year
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- ☆10Aug 31, 2017Updated 8 years ago
- Scoring engine for cyber defense competitions☆10Jan 30, 2022Updated 4 years ago
- Platform for sharing complex information about security forces. Powers WhoWasInCommand.com☆10Mar 1, 2024Updated last year