Please use https://github.com/veeral-patel/true-positive instead
β70Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for incidents
Users that are interested in incidents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collaborative, web-based case management for incident responseβ24Jan 23, 2024Updated 2 years ago
- π Intrusion Detection Systemβ17Jan 10, 2023Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Jun 8, 2017Updated 8 years ago
- DFIRTrack - The Incident Response Tracking Applicationβ533Jan 13, 2026Updated 3 months ago
- Pritunl Access Control Systemβ10Feb 16, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packsβ54Jul 20, 2023Updated 2 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visitβ29Jan 10, 2026Updated 3 months ago
- A collection of my presentation materials.β17Apr 29, 2024Updated last year
- Tools to search through massive amounts of dataβ21Oct 20, 2025Updated 5 months ago
- This script is used for extracting DDE in docx and xlsxβ12Dec 8, 2017Updated 8 years ago
- A free incident response management and documentation workbookβ25Nov 13, 2018Updated 7 years ago
- Threat Detection & Anomaly Detection rules for popular open-source componentsβ53Jul 27, 2022Updated 3 years ago
- Various short scripts and tools used for Digital Forensicsβ14Apr 13, 2025Updated last year
- Import AbuseCH IOC Feeds into MISPβ12Feb 17, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Kibana app for RedELKβ18Mar 19, 2023Updated 3 years ago
- A Real-time Event Correlation platformβ16Jan 30, 2017Updated 9 years ago
- Firepit - STIX Columnar Storageβ18Jun 5, 2024Updated last year
- Wrap any binary into a cached webserverβ61Apr 5, 2022Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentationβ13Aug 16, 2022Updated 3 years ago
- Information and Cyber Security Certificationsβ14Feb 14, 2019Updated 7 years ago
- certstream + analyticsβ11Jan 17, 2020Updated 6 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslistsβ14Dec 27, 2017Updated 8 years ago
- A library for creating wrappers around command-line programs.β32Oct 6, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Triage automation for suspect URLsβ13Jul 23, 2019Updated 6 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.β28Sep 16, 2021Updated 4 years ago
- Miscellaneous parsing scripts for penetration testingβ12Jul 17, 2023Updated 2 years ago
- Small Python-based web application honeypot with built-in analysis tools.β12Sep 15, 2019Updated 6 years ago
- CSIRT Jump Bagβ27Apr 25, 2024Updated last year
- Scripts targeting specific familiesβ13Jul 3, 2017Updated 8 years ago
- 1-Click push forensics evidence to the cloudβ144Mar 18, 2026Updated last month
- The Repository pattern adds a separation layer between the data and domain layers of an application. It also makes the data access parts β¦β28Jul 19, 2012Updated 13 years ago
- Malware Analysis toolsβ26Sep 14, 2024Updated last year
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged processβ65May 24, 2019Updated 6 years ago
- Monitors the network for new connected MAC addressesβ17Dec 10, 2022Updated 3 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components suchβ¦β13Sep 21, 2025Updated 6 months ago
- Threat Box Assessment Toolβ19Mar 5, 2026Updated last month
- Proof-of-concept for phishing intelligence in Elasticβ15Apr 30, 2019Updated 6 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.β280Dec 13, 2021Updated 4 years ago
- The yaml documents for the CTFman search system.β12May 16, 2019Updated 6 years ago