wavestone-cdt / 1-2-3-CyberLinks
☆17Updated 4 years ago
Alternatives and similar repositories for 1-2-3-Cyber
Users that are interested in 1-2-3-Cyber are comparing it to the libraries listed below
Sorting:
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆40Updated 4 months ago
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆251Updated last month
- ☆25Updated 3 years ago
- Guide journalisation Microsoft☆69Updated 11 months ago
- Rapports techniques de VIGINUM☆33Updated 2 months ago
- Active Directory permissions (ACL/ACE) auditing tools☆148Updated 8 years ago
- petit "playbook" qui pourrait servir de base à une réponse à incident lors d'une attaque de type ransomware☆21Updated 2 years ago
- Configurations for DFIR ORC☆27Updated last year
- ☆22Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated last month
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago
- The WooKey project manifest repository, use repo init -u https://github.com/wookey-project/manifest.git☆17Updated 4 years ago
- Outlook add-in companion to report suspicious mail easily☆131Updated 2 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Updated 7 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated 4 months ago
- USB Scanning device☆26Updated this week
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆12Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- Home for TRANSITS materials☆25Updated 11 months ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆145Updated 4 months ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- Website for ail-typo-squatting library☆60Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 9 months ago
- ☆15Updated 3 years ago
- ☆160Updated 8 months ago
- Linux Incident Response☆90Updated 5 years ago
- ☆33Updated 2 years ago