The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams
☆64Jul 15, 2020Updated 5 years ago
Alternatives and similar repositories for IRtools
Users that are interested in IRtools are comparing it to the libraries listed below
Sorting:
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆74Apr 4, 2025Updated 10 months ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- ☆30Mar 3, 2021Updated 5 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 2 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated this week
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆35Oct 21, 2025Updated 4 months ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- ☆16Apr 30, 2024Updated last year
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆24Mar 12, 2025Updated 11 months ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆14May 24, 2022Updated 3 years ago
- CLI generator for Velociraptor offline collector☆16Oct 10, 2025Updated 4 months ago
- ☆15Oct 29, 2024Updated last year
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- Home for TRANSITS materials☆25Jul 24, 2024Updated last year
- Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security communit…☆28Dec 17, 2025Updated 2 months ago
- You're busted!☆27Dec 16, 2019Updated 6 years ago
- Rust implementation of the DCSO Bloom filter☆29Jul 15, 2025Updated 7 months ago
- ☆52Sep 5, 2018Updated 7 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆354Oct 6, 2021Updated 4 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago