wavestone-cdt / 1-2-3-Cyber
☆17Updated 4 years ago
Alternatives and similar repositories for 1-2-3-Cyber:
Users that are interested in 1-2-3-Cyber are comparing it to the libraries listed below
- ☆24Updated 3 years ago
- Guide journalisation Microsoft☆60Updated 9 months ago
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆243Updated 3 months ago
- petit "playbook" qui pourrait servir de base à une réponse à incident lors d'une attaque de type ransomware☆21Updated 2 years ago
- Active Directory permissions (ACL/ACE) auditing tools☆148Updated 7 years ago
- ☆21Updated last year
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- Website for ail-typo-squatting library☆58Updated 10 months ago
- USB Scanning device☆25Updated this week
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆65Updated 3 weeks ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- ☆17Updated 5 years ago
- log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)☆36Updated 3 years ago
- Configurations for DFIR ORC☆27Updated last year
- ☆15Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 4 months ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆58Updated 4 years ago
- Rapports techniques de VIGINUM☆33Updated this week
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- Retrieves information about a given domain from the Google Transparency Report : https://transparencyreport.google.com/https/certificates☆21Updated 3 years ago
- DEbian Cve REproducer Tool☆24Updated last year
- Import AbuseCH IOC Feeds into MISP☆12Updated 4 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 5 months ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆143Updated 2 months ago
- This Risk Rating Calculator is based on OWASP's Risk Rating Methodology☆22Updated 11 months ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 7 months ago