Please use https://github.com/veeral-patel/true-positive instead
β71Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for incidents
Users that are interested in incidents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collaborative, web-based case management for incident responseβ24Jan 23, 2024Updated 2 years ago
- π Intrusion Detection Systemβ17Jan 10, 2023Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Jun 8, 2017Updated 8 years ago
- DFIRTrack - The Incident Response Tracking Applicationβ534Jan 13, 2026Updated 2 months ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packsβ55Jul 20, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visitβ29Jan 10, 2026Updated 2 months ago
- A collection of my presentation materials.β17Apr 29, 2024Updated last year
- Tools to search through massive amounts of dataβ21Oct 20, 2025Updated 5 months ago
- This script is used for extracting DDE in docx and xlsxβ12Dec 8, 2017Updated 8 years ago
- A free incident response management and documentation workbookβ25Nov 13, 2018Updated 7 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.β1,341Dec 13, 2022Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source componentsβ53Jul 27, 2022Updated 3 years ago
- Various short scripts and tools used for Digital Forensicsβ14Apr 13, 2025Updated 11 months ago
- Import AbuseCH IOC Feeds into MISPβ12Feb 17, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Real-time Event Correlation platformβ16Jan 30, 2017Updated 9 years ago
- A detailed list of potentially dangerous file extensionsβ18Jun 18, 2025Updated 9 months ago
- Firepit - STIX Columnar Storageβ18Jun 5, 2024Updated last year
- Wrap any binary into a cached webserverβ60Apr 5, 2022Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentationβ13Aug 16, 2022Updated 3 years ago
- Information and Cyber Security Certificationsβ14Feb 14, 2019Updated 7 years ago
- Various Modules & Scripts for use with Viper Frameworkβ27Aug 20, 2019Updated 6 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslistsβ14Dec 27, 2017Updated 8 years ago
- Triage automation for suspect URLsβ13Jul 23, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.β28Sep 16, 2021Updated 4 years ago
- Miscellaneous parsing scripts for penetration testingβ12Jul 17, 2023Updated 2 years ago
- Small Python-based web application honeypot with built-in analysis tools.β12Sep 15, 2019Updated 6 years ago
- CSIRT Jump Bagβ27Apr 25, 2024Updated last year
- Scripts targeting specific familiesβ13Jul 3, 2017Updated 8 years ago
- 1-Click push forensics evidence to the cloudβ144Mar 18, 2026Updated last week
- The Repository pattern adds a separation layer between the data and domain layers of an application. It also makes the data access parts β¦β28Jul 19, 2012Updated 13 years ago
- Malware Analysis toolsβ26Sep 14, 2024Updated last year
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged processβ65May 24, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Monitors the network for new connected MAC addressesβ17Dec 10, 2022Updated 3 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components suchβ¦β13Sep 21, 2025Updated 6 months ago
- Threat Box Assessment Toolβ19Mar 5, 2026Updated 3 weeks ago
- Proof-of-concept for phishing intelligence in Elasticβ15Apr 30, 2019Updated 6 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.β280Dec 13, 2021Updated 4 years ago
- The yaml documents for the CTFman search system.β12May 16, 2019Updated 6 years ago
- Import specific data sources into the Sigma generic and open signature format.β79May 6, 2022Updated 3 years ago