Please use https://github.com/veeral-patel/true-positive instead
β70Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for incidents
Users that are interested in incidents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collaborative, web-based case management for incident responseβ24Jan 23, 2024Updated 2 years ago
- π Intrusion Detection Systemβ17Jan 10, 2023Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Jun 8, 2017Updated 8 years ago
- DFIRTrack - The Incident Response Tracking Applicationβ534Jan 13, 2026Updated 3 months ago
- Pritunl Access Control Systemβ10Feb 16, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packsβ54Jul 20, 2023Updated 2 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visitβ29Jan 10, 2026Updated 3 months ago
- A collection of my presentation materials.β17Apr 29, 2024Updated 2 years ago
- Tools to search through massive amounts of dataβ21Oct 20, 2025Updated 6 months ago
- This script is used for extracting DDE in docx and xlsxβ12Dec 8, 2017Updated 8 years ago
- A free incident response management and documentation workbookβ25Nov 13, 2018Updated 7 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.β1,345Dec 13, 2022Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source componentsβ53Jul 27, 2022Updated 3 years ago
- Various short scripts and tools used for Digital Forensicsβ14Apr 13, 2025Updated last year
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Import AbuseCH IOC Feeds into MISPβ12Feb 17, 2021Updated 5 years ago
- Kibana app for RedELKβ18Mar 19, 2023Updated 3 years ago
- A Real-time Event Correlation platformβ16Jan 30, 2017Updated 9 years ago
- A detailed list of potentially dangerous file extensionsβ18Jun 18, 2025Updated 10 months ago
- Firepit - STIX Columnar Storageβ18Jun 5, 2024Updated last year
- Wrap any binary into a cached webserverβ61Apr 5, 2022Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentationβ13Aug 16, 2022Updated 3 years ago
- Information and Cyber Security Certificationsβ14Feb 14, 2019Updated 7 years ago
- certstream + analyticsβ11Jan 17, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Various Modules & Scripts for use with Viper Frameworkβ27Aug 20, 2019Updated 6 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslistsβ14Dec 27, 2017Updated 8 years ago
- Triage automation for suspect URLsβ13Jul 23, 2019Updated 6 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.β28Sep 16, 2021Updated 4 years ago
- Miscellaneous parsing scripts for penetration testingβ12Jul 17, 2023Updated 2 years ago
- Small Python-based web application honeypot with built-in analysis tools.β12Sep 15, 2019Updated 6 years ago
- CSIRT Jump Bagβ27Apr 25, 2024Updated 2 years ago
- Scripts targeting specific familiesβ13Jul 3, 2017Updated 8 years ago
- 1-Click push forensics evidence to the cloudβ145Mar 18, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The Repository pattern adds a separation layer between the data and domain layers of an application. It also makes the data access parts β¦β28Jul 19, 2012Updated 13 years ago
- Malware Analysis toolsβ26Sep 14, 2024Updated last year
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged processβ65May 24, 2019Updated 6 years ago
- Monitors the network for new connected MAC addressesβ17Dec 10, 2022Updated 3 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components suchβ¦β13Apr 18, 2026Updated 3 weeks ago
- Threat Box Assessment Toolβ19Mar 5, 2026Updated 2 months ago
- Proof-of-concept for phishing intelligence in Elasticβ15Apr 30, 2019Updated 7 years ago