wavestone-cdt / 1-2-3-Cyber
☆17Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for 1-2-3-Cyber
- ☆20Updated 3 years ago
- ☆16Updated 7 months ago
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆40Updated 10 months ago
- Guide journalisation Microsoft☆57Updated 4 months ago
- ☆15Updated 2 years ago
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆221Updated 5 months ago
- Configurations for DFIR ORC☆24Updated 7 months ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆78Updated 9 months ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated last year
- CSIRT Jump Bag☆27Updated 6 months ago
- The core backend server handling API requests and task management☆31Updated 2 weeks ago
- Rapports techniques de VIGINUM☆30Updated 2 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆27Updated this week
- petit "playbook" qui pourrait servir de base à une réponse à incident lors d'une attaque de type ransomware☆21Updated 2 years ago
- Web Application for domain name monitoring / alerting☆62Updated 3 months ago
- Retrieves information about a given domain from the Google Transparency Report : https://transparencyreport.google.com/https/certificates☆21Updated 2 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆43Updated 2 years ago
- ☆15Updated 4 years ago
- Intrusion Detection Honeypots Book Code☆24Updated 4 years ago
- Find abuse contacts for observables☆69Updated 2 years ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆64Updated last month
- TAPIR is a multi-user, client/server, incident response framework☆44Updated 2 years ago
- Site for IWS book content☆18Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 3 years ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆51Updated 2 weeks ago
- Documentation for DFIR ORC, artefact collection tool dedicated to Microsoft Windows☆12Updated 5 months ago
- ☆17Updated 5 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆17Updated 5 years ago