mindmap created for tools can be used during analysis/investigation
☆28Jan 4, 2017Updated 9 years ago
Alternatives and similar repositories for Tools-mindmap
Users that are interested in Tools-mindmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 9 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- ☆16Apr 16, 2015Updated 11 years ago
- A DFVFS Backed Forensic Viewer☆42Apr 13, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- ☆13Aug 2, 2020Updated 5 years ago
- Python Forensic and Log Analysis GUI☆27Dec 22, 2014Updated 11 years ago
- PERCEIVE is a project incubator inspired by Apache Incubator and Stack Exchange's Area 51. It serves as a staging zone repository for the…☆13May 21, 2018Updated 7 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Various DFIR Tools☆27Jul 23, 2018Updated 7 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 12 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Security R package with a set of utils to analyse the different industry standards (MITRE and NIST).☆12May 27, 2019Updated 6 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Install mostly used pentesting and CTF tools in Ubuntu 18.04 without adding any extra repository, preventing any crashes in repositories.☆15Apr 29, 2020Updated 6 years ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆22Apr 15, 2016Updated 10 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- ☆18Apr 26, 2021Updated 5 years ago
- Data files for use with hubble☆16Apr 21, 2020Updated 6 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆29May 4, 2016Updated 9 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- WEFTools☆14Apr 30, 2020Updated 6 years ago
- Detect HTTP stalling attacks like slowloris with Bro☆19Mar 1, 2018Updated 8 years ago
- ☆10Jan 22, 2025Updated last year
- Dump of organized knowledge on DFIR☆137Oct 4, 2021Updated 4 years ago
- Create Users in Active Directory This script creates 270 + users in Active Directory.☆19Oct 20, 2020Updated 5 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Powershell script for frequency analysis of separated values data files.☆17Jan 22, 2014Updated 12 years ago
- ☆12Oct 1, 2021Updated 4 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 9 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆37Feb 9, 2024Updated 2 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Unofficial pdf/epub of the content of "re:Work" from Google Inc. Pdf/epub can be found here: https://github.com/daniperez/rework/releases☆11Jul 4, 2025Updated 9 months ago