wavestone-cdt / 1-2-3-CyberLinks
☆18Updated 5 years ago
Alternatives and similar repositories for 1-2-3-Cyber
Users that are interested in 1-2-3-Cyber are comparing it to the libraries listed below
Sorting:
- ☆25Updated 3 years ago
- ☆23Updated last year
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆40Updated 6 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆18Updated 6 years ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆261Updated last month
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆69Updated 5 months ago
- Retrieves information about a given domain from the Google Transparency Report : https://transparencyreport.google.com/https/certificates☆21Updated 3 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆35Updated 2 months ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Updated 4 years ago
- Simple yara rule manager☆66Updated 2 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Rapports techniques de VIGINUM☆36Updated 4 months ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Updated 4 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆69Updated 4 months ago
- ☆35Updated 11 months ago
- Intrusion Detection Honeypots Book Code☆25Updated 5 years ago
- ☆23Updated 5 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆60Updated 3 months ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆32Updated 2 years ago
- A simple binary wrapper for DNS canarytokens.☆25Updated 2 years ago
- Defensomania is a security monitoring and incident response card game.☆63Updated 2 years ago
- Sys Mon! Why yu nuh logging dat?☆12Updated 6 years ago
- Configurations for DFIR ORC☆28Updated last year
- Valhalla API Client☆70Updated 2 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆41Updated 4 years ago