w8mej / IRKnowledgeLinks
A curated list of tools for incident response
☆34Updated last year
Alternatives and similar repositories for IRKnowledge
Users that are interested in IRKnowledge are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆24Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆45Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 14 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆29Updated 9 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆24Updated 9 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Lite version of PDF X-RAY that uses no backend☆38Updated 14 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Updated 8 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated last month
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 10 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Updated 2 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Passive recon / OSINT automation script☆39Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Updated 7 years ago
- Create custom Windows batch files from a configuration file☆32Updated 9 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 4 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 8 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- Collection of information security policies.☆29Updated 8 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Updated 4 years ago
- Next Generation of White Chapel☆21Updated 11 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago