enisaeu / IRtools
The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams
☆58Updated 4 years ago
Alternatives and similar repositories for IRtools:
Users that are interested in IRtools are comparing it to the libraries listed below
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆66Updated last month
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated last month
- A collection of tips for using MISP.☆74Updated 4 months ago
- ☆35Updated 4 years ago
- IntelMQ Tutorial and Introductory Documentation☆14Updated 2 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 3 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 5 years ago
- Home for TRANSITS materials☆25Updated 9 months ago
- An open source platform to support analysts to organise their case and tasks☆71Updated last week
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆53Updated last week
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- Scripts for TheHive.☆22Updated 5 years ago
- ☆34Updated 6 months ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 2 weeks ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- ☆77Updated 5 years ago
- Cleanup of older MISP events can require some work until now☆25Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 2 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Incident Response Network Tools☆24Updated 3 years ago
- The FASTEST way to consume threat intel.☆68Updated last year