ruppde / euli_treasure_huntLinks
Euli is not a computer game but a tool which helps you set up a real life treasure hunt
☆43Updated 4 years ago
Alternatives and similar repositories for euli_treasure_hunt
Users that are interested in euli_treasure_hunt are comparing it to the libraries listed below
Sorting:
- A CVE Heatmap Using CalPlot☆97Updated 5 years ago
- Automated handling of data feeds for security teams☆147Updated 3 weeks ago
- Different tools, koen.vanimpe@cudeso.be☆137Updated 6 months ago
- Please use https://github.com/veeral-patel/true-positive instead☆71Updated 3 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 6 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆91Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 2 weeks ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Useful commands for infosec☆28Updated 2 years ago
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago
- Tool used to perform threat intelligence against packet data☆36Updated last year
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆64Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 3 years ago
- Wrap any binary into a cached webserver☆57Updated 3 years ago
- Python library used by CIRCLean (the USB sanitizer) and others☆54Updated 2 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 2 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Scripts to analyze stuff☆146Updated 6 months ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆65Updated 2 years ago
- A collection of typical false positive indicators☆56Updated 5 years ago
- ☆52Updated 7 years ago
- Defensomania is a security monitoring and incident response card game.☆63Updated 2 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated 2 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- Website crawler with YARA detection☆90Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Updated 2 years ago