sans-sroc / integrityLinks
Validation tool for SANS Courseware files. Generates and validates against a checksum file.
☆21Updated last month
Alternatives and similar repositories for integrity
Users that are interested in integrity are comparing it to the libraries listed below
Sorting:
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 6 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 4 years ago
- ☆11Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆51Updated 4 months ago
- Recon Hunt Queries☆79Updated 4 years ago
- My Jupyter Notebooks☆36Updated 8 months ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆48Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 9 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆61Updated 5 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- ☆77Updated last week
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated last month
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Collection of videos of Raids on Cybercriminals☆20Updated 7 months ago
- AIL project training materials☆37Updated 3 months ago
- Incident Response Network Tools☆24Updated 4 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- Yara scan Phishing Kit's Zip archive(s)☆61Updated 4 months ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆107Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆33Updated last year
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 5 years ago
- Automatic detection engineering technical state compliance☆55Updated last year