sans-sroc / integrityLinks
Validation tool for SANS Courseware files. Generates and validates against a checksum file.
☆21Updated 3 weeks ago
Alternatives and similar repositories for integrity
Users that are interested in integrity are comparing it to the libraries listed below
Sorting:
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆41Updated 8 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 4 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 11 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆62Updated 7 months ago
- ☆11Updated 5 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆49Updated 3 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- My Jupyter Notebooks☆36Updated 9 months ago
- ☆79Updated last month
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 3 months ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆70Updated last year
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Converting data from services like Censys and Shodan to a common data model☆50Updated this week
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Updated 2 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 5 years ago
- Cyber Underground General Intelligence Requirements☆97Updated last year
- Penguin OS Forensic (or Flight) Recorder☆41Updated last year