cudeso / tools
Different tools, koen.vanimpe@cudeso.be
☆108Updated 3 weeks ago
Alternatives and similar repositories for tools:
Users that are interested in tools are comparing it to the libraries listed below
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Your Everyday Threat Intelligence☆22Updated 7 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- automate your MISP installs☆66Updated 4 years ago
- Miscelaneous Dockers☆46Updated 3 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated last month
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- Expert Investigation Guides☆51Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 7 years ago
- ☆48Updated 4 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 4 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Presentation Slides and Video links☆32Updated 3 years ago
- Scripts for TheHive.☆22Updated 5 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Updated 5 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 5 months ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 5 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Updated 4 years ago
- Volatility plugins created by the author☆44Updated 9 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆37Updated 2 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Lootbox downloads open directories shared on Twitter.☆36Updated 3 years ago
- For storing of the volumes☆4Updated 4 years ago
- PowerShell No Agent Hunting☆109Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago