sans-sroc / integrityLinks
Validation tool for SANS Courseware files. Generates and validates against a checksum file.
☆22Updated last month
Alternatives and similar repositories for integrity
Users that are interested in integrity are comparing it to the libraries listed below
Sorting:
- ☆11Updated 5 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆42Updated 3 weeks ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆56Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- ☆78Updated 3 weeks ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Updated 4 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- Script that checks for available updates for the most commonly used Digital Forensics tools☆60Updated 5 years ago
- Resources, tools and utilities about Threat Intelligence☆81Updated 2 years ago
- Tool used to perform threat intelligence against packet data☆36Updated last year
- My Jupyter Notebooks☆36Updated 10 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63Updated 8 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 4 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- Incident Response Network Tools☆24Updated 4 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆28Updated 5 years ago
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Updated last week
- A collection of tips for using MISP.☆75Updated last year
- Cyber Underground General Intelligence Requirements☆97Updated 2 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- Wrap any binary into a cached webserver☆57Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Updated 3 years ago
- Converting data from services like Censys and Shodan to a common data model☆51Updated last week
- Penguin OS Forensic (or Flight) Recorder☆40Updated last year