korniko98 / pivot-atlasView external linksLinks
☆102Dec 9, 2025Updated 2 months ago
Alternatives and similar repositories for pivot-atlas
Users that are interested in pivot-atlas are comparing it to the libraries listed below
Sorting:
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆281Mar 20, 2025Updated 10 months ago
- Remote access and Antivirus Logging Database☆45Apr 28, 2024Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 6 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆167Dec 7, 2025Updated 2 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- MISP Playbooks☆222Oct 14, 2025Updated 4 months ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Nov 26, 2025Updated 2 months ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- ☆11May 13, 2024Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆97Feb 2, 2024Updated 2 years ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- custom Python script to perform Yara matching in Cortex XDR☆14May 18, 2021Updated 4 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆384Oct 1, 2024Updated last year
- ☆118Dec 6, 2025Updated 2 months ago
- Autopsy Module to analyze Registry Hives☆16Feb 18, 2022Updated 3 years ago
- ☆94Dec 25, 2025Updated last month
- ☆23Mar 17, 2024Updated last year
- LotL RMM☆298Feb 1, 2026Updated 2 weeks ago
- Helm charts for running open source digital forensic tools in Kubernetes☆182Feb 9, 2026Updated last week
- DFIQ is a collection of investigative questions and the approaches for answering them☆301Jan 17, 2025Updated last year
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- A collection of methods to learn who the owner of an IP address is.☆224Sep 29, 2025Updated 4 months ago
- Tools used by CSIRT and especially in the scope of CNW☆17Jan 14, 2026Updated last month
- Web Application for domain name monitoring / alerting☆64Aug 1, 2024Updated last year
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Jun 20, 2022Updated 3 years ago
- Repository of public reference frameworks for the DFIR community.☆121Jul 4, 2023Updated 2 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Apr 1, 2024Updated last year