opensourcesec / CIRTKit
Tools for the Computer Incident Response Team
☆142Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for CIRTKit
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- PowerShell No Agent Hunting☆108Updated 6 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Sandbox feature upgrade with the help of wrapped samples☆75Updated 6 years ago
- Understanding ATT&CK Matrix for Enterprise☆79Updated 6 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 3 years ago
- Threat Alert Logic Repository☆89Updated 5 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆148Updated 6 months ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆71Updated 3 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆162Updated 5 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- Cyber Intel Management☆46Updated 6 years ago
- Invoke-LiveResponse☆145Updated 2 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- A Splunk app to use MISP in background☆109Updated 3 weeks ago
- Python tool and library to help analyze files during malware triage and analysis.☆77Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Mass static malware analysis tool☆91Updated 2 years ago
- Repository for my ATT&CK analysis research.☆68Updated 5 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Updated 3 years ago
- Hunting IOCs all day every day...☆83Updated last year
- A Splunk app with saved reports derived from Sigma rules☆72Updated 6 years ago
- Python IOC Editor☆61Updated 9 years ago
- IR-Tools - PowerShell tools for IR☆128Updated 7 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 3 years ago
- automate your MISP installs☆66Updated 4 years ago
- Some IR notes☆73Updated 8 years ago