sans-sroc / integrityLinks
Validation tool for SANS Courseware files. Generates and validates against a checksum file.
☆21Updated last week
Alternatives and similar repositories for integrity
Users that are interested in integrity are comparing it to the libraries listed below
Sorting:
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 6 months ago
- ☆11Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 8 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆48Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Recon Hunt Queries☆78Updated 4 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- ☆77Updated 2 weeks ago
- Penguin OS Forensic (or Flight) Recorder☆41Updated 9 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 weeks ago
- Converting data from services like Censys and Shodan to a common data model☆50Updated 3 months ago
- Hashes of infamous malware☆26Updated 2 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆51Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆65Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆20Updated 7 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆61Updated 4 months ago
- Cyber Underground General Intelligence Requirements☆96Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last week
- DNS Dashboard for hunting and identifying beaconing☆16Updated 5 years ago
- Website crawler with YARA detection☆90Updated 2 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Updated 8 months ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- ☆30Updated 6 years ago