globecyber / InfornitoLinks
Extract forensic interesting information from Chrome, Firefox, Safari browsers ...
☆29Updated 6 years ago
Alternatives and similar repositories for Infornito
Users that are interested in Infornito are comparing it to the libraries listed below
Sorting:
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆58Updated last year
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 5 years ago
- ☆150Updated 2 years ago
- Google Chrome forensic tool to process, analyze and visualize browsing artifacts☆122Updated this week
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- ☆67Updated 2 months ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆28Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 8 years ago
- URL fingerprinting made easy☆90Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated last month
- ReWrite of AChoir in Go for Cross Platform☆42Updated last week
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆102Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- an awesome list of active defense resources☆126Updated 5 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆92Updated last year
- A curated list of KAPE-related resources☆177Updated 6 months ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 3 years ago
- Jupyter Notebooks for the Blue Team☆39Updated 10 months ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆87Updated 5 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 5 years ago
- Backstage Parser☆33Updated 3 years ago
- A jupyter notebook that contains the main commands executed during a penetration test☆75Updated 5 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last month
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Updated 2 years ago