cudeso / toolsLinks
Different tools, koen.vanimpe@cudeso.be
☆136Updated 5 months ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- A collection of typical false positive indicators☆56Updated 5 years ago
- automate your MISP installs☆68Updated 5 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆62Updated 7 months ago
- Miscelaneous Dockers☆47Updated 4 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Python script to batch query the Tor Relays and Bridges☆37Updated 6 years ago
- Hunting IOCs all day every day...☆87Updated 2 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- Different DFIR and CTI utilities☆37Updated 5 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 6 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆68Updated 5 years ago
- Incident Response Triage - Windows Evidence Collection for Forensic Analysis☆136Updated 9 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 months ago
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- ☆39Updated 6 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 9 years ago
- ☆77Updated 6 years ago
- Various tools and scripts☆43Updated 3 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆25Updated 6 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Updated 4 years ago
- Python IOC Editor☆65Updated 10 years ago
- Build your own threat hunting maturity model☆11Updated 8 years ago
- PowerShell No Agent Hunting☆111Updated 7 years ago
- Wrap any binary into a cached webserver☆57Updated 3 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- ☆50Updated 5 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 4 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 5 years ago