☆45Nov 30, 2022Updated 3 years ago
Alternatives and similar repositories for Threat-Response-Docker
Users that are interested in Threat-Response-Docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆12Oct 29, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- cloud-audit (云安全审计助手)是检测公有云厂商AK/SK泄漏被利用的工具,通过定期调用云平台接口审计日志,基于异常行为/黑特征/基线发现疑似入侵行为。☆43Jun 4, 2024Updated last year
- ☆16Mar 19, 2026Updated 2 months ago
- ☆28Aug 6, 2022Updated 3 years ago
- ☆12May 3, 2026Updated 2 weeks ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆104Dec 29, 2023Updated 2 years ago
- ☆20May 27, 2020Updated 5 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 11 months ago
- MISP Docker (XME edition)☆281Dec 5, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 面向项目版本差异性的漏洞识别技术研究☆14Mar 29, 2022Updated 4 years ago
- ☆18Apr 7, 2023Updated 3 years ago
- ATT&CK技战术数据☆15Feb 8, 2021Updated 5 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- A mapreduce implementation of SLCT (http://ristov.users.sourceforge.net/slct/) using Disco.☆16Sep 20, 2011Updated 14 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆66May 24, 2020Updated 5 years ago
- Dockerized Zeek☆12Mar 9, 2024Updated 2 years ago
- ☆11Nov 14, 2024Updated last year
- ☆45Nov 7, 2024Updated last year
- GCNotify is an Outlook addin for quickly forwarding mail as attachment to a pre-defined e-mail address.☆12Jan 17, 2023Updated 3 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆28Apr 10, 2024Updated 2 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- An automation tool to generate, obfuscate, compile and run symbolic execution on c source files☆14Feb 17, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 3 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 4 months ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆47Jan 2, 2022Updated 4 years ago
- My first trial at Ethical Hacking Write Ups☆22Jul 23, 2020Updated 5 years ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆33Jan 16, 2024Updated 2 years ago
- ☆26Jun 22, 2022Updated 3 years ago
- CTI database generator and public dataset☆22Jan 12, 2020Updated 6 years ago