nccgroup / ImpossibleTravelLogAnalysisLinks
Basic log analysis tool to detect impossible travel via IP address geographic information
☆20Updated 6 years ago
Alternatives and similar repositories for ImpossibleTravelLogAnalysis
Users that are interested in ImpossibleTravelLogAnalysis are comparing it to the libraries listed below
Sorting:
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Small scripts and POCs related to digital forensics☆17Updated 2 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Python bindings for Yeti's API☆18Updated last year
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- A Passive DNS backend and collector☆31Updated 3 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 8 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- This is a python version of samesame repo to generate homograph strings☆23Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆26Updated 7 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- A collection of useful scripts☆24Updated 6 years ago
- ☆57Updated 10 years ago
- Lootbox downloads open directories shared on Twitter.☆35Updated 4 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Tools for NTDS.dit☆17Updated 7 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago