nccgroup / ImpossibleTravelLogAnalysis
Basic log analysis tool to detect impossible travel via IP address geographic information
☆20Updated 6 years ago
Alternatives and similar repositories for ImpossibleTravelLogAnalysis
Users that are interested in ImpossibleTravelLogAnalysis are comparing it to the libraries listed below
Sorting:
- Python bindings for Yeti's API☆18Updated last year
- Small scripts and POCs related to digital forensics☆17Updated 2 years ago
- Useful commands for infosec☆29Updated 2 years ago
- ☆11Updated 6 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- ☆14Updated 6 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27Updated 4 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 7 months ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated last year
- HoneyDB Python Module☆13Updated last year
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- ☆10Updated 9 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago