cudeso / toolsLinks
Different tools, koen.vanimpe@cudeso.be
☆131Updated last week
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- A collection of typical false positive indicators☆55Updated 4 years ago
- automate your MISP installs☆68Updated 4 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Open source training materials for law-enforcement and organisations interested in DFIR.☆59Updated 3 weeks ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- ☆77Updated 5 years ago
- Miscelaneous Dockers☆47Updated 3 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆31Updated 4 years ago
- Files vetted, and approved for public release☆53Updated last year
- Hunting IOCs all day every day...☆86Updated last year
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Updated 2 years ago
- Hunt malware with Volatility☆47Updated last year
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- misp-cloud - Cloud-ready images of MISP☆73Updated 2 years ago
- ☆35Updated 4 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- Your Everyday Threat Intelligence☆22Updated 8 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- Scripts for TheHive.☆23Updated 5 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 9 months ago
- Volatility plugins created by the author☆44Updated 9 years ago
- ☆32Updated last year
- A community event for security researchers to share their favorite notebooks☆107Updated last year