tap-ir / tapir
TAPIR is a multi-user, client/server, incident response framework
☆44Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for tapir
- ☆84Updated 8 months ago
- Digital Forensics Artifacts Knowledge Base☆75Updated 5 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆48Updated 7 months ago
- Hunt malware with Volatility☆47Updated 6 months ago
- Logbook for Digital Forensics and Incident Response☆49Updated 3 months ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆49Updated last year
- A home for detection content developed by the delivr.to team☆59Updated 2 months ago
- YARA rule analyzer to improve rule quality and performance☆93Updated 11 months ago
- C2 Active Scanner☆47Updated 4 months ago
- BlackBerry Threat Research & Intelligence☆93Updated last year
- Because phishtank was taken.. explore phishing kits in a contained environment!☆43Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Forensic Artifact Collection Tool Matrix☆73Updated 2 years ago
- Information about the open-source-dfir slack community☆27Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆29Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆56Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- Python based CLI for MalwareBazaar☆36Updated last week
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆68Updated 11 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆110Updated 10 months ago
- ☆1Updated 2 weeks ago
- Remote access and Antivirus Logging Database☆41Updated 6 months ago
- CSIRT Jump Bag☆27Updated 6 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 5 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆80Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆109Updated 11 months ago
- A web scraper to create MISP events and reports☆14Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago