☆121Jan 29, 2026Updated last month
Alternatives and similar repositories for certrss
Users that are interested in certrss are comparing it to the libraries listed below
Sorting:
- ☆12Jul 15, 2022Updated 3 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Nov 18, 2024Updated last year
- ☆24Sep 28, 2022Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆170Jun 19, 2024Updated last year
- egrets monitors egress☆47Apr 12, 2020Updated 5 years ago
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- ☆28Mar 29, 2022Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- A modern Python-3-based alternative to RegRipper☆205Mar 31, 2025Updated 11 months ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,113Feb 14, 2026Updated 2 weeks ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 6 years ago
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Sep 8, 2022Updated 3 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆122Jul 4, 2023Updated 2 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- MAL-CL (Malicious Command-Line)☆322Jan 10, 2023Updated 3 years ago
- The Data Analysis Pipeline☆17Apr 23, 2019Updated 6 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆127Jul 14, 2024Updated last year
- ☆10May 12, 2022Updated 3 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆133Mar 28, 2022Updated 3 years ago
- ☆215Jun 5, 2025Updated 9 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago