☆44Nov 30, 2022Updated 3 years ago
Alternatives and similar repositories for Threat-Response-Docker
Users that are interested in Threat-Response-Docker are comparing it to the libraries listed below
Sorting:
- cloud-audit (云安全审计助手)是检测公有云厂商AK/SK泄漏被利用的工具,通过定期调用云平台接口审计日志,基于异常行为/黑特征/基线发现疑似入侵行为。☆42Jun 4, 2024Updated last year
- ☆11Dec 9, 2025Updated 3 months ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- ☆49Oct 28, 2022Updated 3 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- My personal config for gethomepage.dev☆15Apr 18, 2025Updated 10 months ago
- ☆46Nov 7, 2024Updated last year
- ATT&CK技战术数据☆15Feb 8, 2021Updated 5 years ago
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆15Nov 11, 2022Updated 3 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- ☆17Oct 13, 2025Updated 4 months ago
- ☆17Aug 23, 2023Updated 2 years ago
- ☆20May 27, 2020Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- PyVelociraptor contains the python bindings for the Velociraptor API.☆21Feb 11, 2026Updated 3 weeks ago
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- ☆22Apr 23, 2024Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- CTF writeup for learning☆22Apr 6, 2021Updated 4 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- ☆19Apr 7, 2023Updated 2 years ago
- Documentation and Issue Tracking for Stucco☆20Mar 7, 2017Updated 9 years ago
- MISP Docker (XME edition)☆282Dec 5, 2023Updated 2 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- fastjson auto type derivation search☆21Aug 19, 2021Updated 4 years ago
- CTI database generator and public dataset☆22Jan 12, 2020Updated 6 years ago
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆66May 24, 2020Updated 5 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 5 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- 这是一款加解密工具适用于勒索病毒应急演练的展示☆21May 31, 2023Updated 2 years ago