cyware-labs / Threat-Response-DockerView external linksLinks
☆44Nov 30, 2022Updated 3 years ago
Alternatives and similar repositories for Threat-Response-Docker
Users that are interested in Threat-Response-Docker are comparing it to the libraries listed below
Sorting:
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- ☆11Dec 9, 2025Updated 2 months ago
- ☆47Oct 28, 2022Updated 3 years ago
- 清羽(ClearFeather)是一款专为网络安全攻防演练设计的资产智能清洗与分类工具。它能够自动化处理攻防演练中的各类资产数据,包括IP、域名、URL等,通过结合DeepSeek API的大语言模型能力和精准的正则表达式处理,实现资产的高效识别、分类与整理。☆22May 29, 2025Updated 8 months ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆28Aug 6, 2022Updated 3 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- ☆16May 28, 2025Updated 8 months ago
- My personal config for gethomepage.dev☆15Apr 18, 2025Updated 9 months ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 3 weeks ago
- ☆23Feb 8, 2026Updated last week
- ☆46Nov 7, 2024Updated last year
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆15Nov 11, 2022Updated 3 years ago
- ATT&CK技战术数据☆15Feb 8, 2021Updated 5 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆104Dec 29, 2023Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- ☆17Aug 23, 2023Updated 2 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- ☆20May 27, 2020Updated 5 years ago
- ☆22Apr 23, 2024Updated last year
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Jan 2, 2022Updated 4 years ago
- Documentation and Issue Tracking for Stucco☆20Mar 7, 2017Updated 8 years ago
- ☆19Apr 7, 2023Updated 2 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- MISP Docker (XME edition)☆282Dec 5, 2023Updated 2 years ago
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆66May 24, 2020Updated 5 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Dec 8, 2024Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆31Jan 16, 2024Updated 2 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 4 months ago
- APT-GUID☆23Oct 23, 2020Updated 5 years ago