csirt-tooling-org / tooling-directoryView external linksLinks
Tools used by CSIRT and especially in the scope of CNW
☆17Jan 14, 2026Updated last month
Alternatives and similar repositories for tooling-directory
Users that are interested in tooling-directory are comparing it to the libraries listed below
Sorting:
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Jun 20, 2022Updated 3 years ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Feb 2, 2022Updated 4 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Simple, fast dictionary-based language detector for short texts.☆20Feb 5, 2026Updated last week
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 4 months ago
- ☆30Mar 3, 2021Updated 4 years ago
- D4 core software (server and sample sensor client)☆42Dec 23, 2023Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Validates Sigma rules using the JSON schema☆22Mar 18, 2024Updated last year
- \B\C\M\C\ Open Source Software☆20Jan 3, 2022Updated 4 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- An open source software directory and release tracker.☆25Feb 4, 2026Updated last week
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Rust implementation of the DCSO Bloom filter☆29Jul 15, 2025Updated 6 months ago
- Web Application for domain name monitoring / alerting☆64Aug 1, 2024Updated last year
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated last month
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last week
- ☆38Nov 2, 2024Updated last year
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Aug 26, 2020Updated 5 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Nov 9, 2022Updated 3 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- 高対話型ハニーポット☆28Mar 10, 2019Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 6 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆84Feb 21, 2024Updated last year
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆86Jan 11, 2024Updated 2 years ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- ☆13Aug 28, 2025Updated 5 months ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆37Dec 15, 2022Updated 3 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 5 months ago