glallen01 / csirt-essential-readingLinks
Reading List for CSIRT Team Members
☆17Updated 6 years ago
Alternatives and similar repositories for csirt-essential-reading
Users that are interested in csirt-essential-reading are comparing it to the libraries listed below
Sorting:
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆69Updated 10 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Small scripts for doing repeatable tasks☆25Updated 3 years ago
- Python script to pull various IOCs from PDFs☆15Updated 10 years ago
- Extract information from MISP via the API☆16Updated 9 years ago
- A warehouse for your malware☆135Updated 3 weeks ago
- SANS Hunting on the Cheap☆36Updated 9 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Updated 6 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- ☆37Updated 8 years ago
- integrating bro into yara☆33Updated 11 years ago
- Some IR notes☆73Updated 9 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 10 years ago
- ☆22Updated 7 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- Threat Intelligence distribution☆31Updated 9 years ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- ☆50Updated 9 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 4 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 10 years ago
- ☆52Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated 11 months ago
- Network Forensics Workshop Files☆17Updated 10 years ago