wavestone-cdt / 1-2-3-CyberLinks
☆18Updated 5 years ago
Alternatives and similar repositories for 1-2-3-Cyber
Users that are interested in 1-2-3-Cyber are comparing it to the libraries listed below
Sorting:
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆41Updated 10 months ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆72Updated 8 months ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 4 years ago
- ☆25Updated 4 years ago
- ☆23Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 6 months ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Updated 2 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Automated handling of data feeds for security teams☆145Updated 2 weeks ago
- Home for TRANSITS materials☆25Updated last year
- Valhalla API Client☆70Updated 2 years ago
- Simple yara rule manager☆66Updated 3 years ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆64Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆115Updated last week
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated 3 weeks ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Updated 4 years ago
- Web Application for domain name monitoring / alerting☆65Updated last year
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated 2 weeks ago
- Website for ail-typo-squatting library☆68Updated 2 months ago
- Intrusion Detection Honeypots Book Code☆26Updated 5 years ago
- Data related to the SANS Internet Storm Center☆13Updated 3 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- USB Scanning device☆31Updated 3 months ago
- Sys Mon! Why yu nuh logging dat?☆12Updated 7 years ago
- Outlook add-in companion to report suspicious mail easily☆133Updated 3 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆148Updated 10 months ago
- Configurations for DFIR ORC☆28Updated last year