catalystCatalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (-53.57%)
OrianaOriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
Stars: ✭ 152 (-22.45%)
BusterAn advanced tool for email reconnaissance
Stars: ✭ 387 (+97.45%)
YarYar is a tool for plunderin' organizations, users and/or repositories.
Stars: ✭ 174 (-11.22%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-78.06%)
FameFAME Automates Malware Evaluation
Stars: ✭ 663 (+238.27%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+404.08%)
MimirSmart OSINT collection of common IOC types
Stars: ✭ 63 (-67.86%)
YetiYour Everyday Threat Intelligence
Stars: ✭ 1,037 (+429.08%)
IntelowlIntel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+978.57%)
ir scriptsincident response scripts
Stars: ✭ 17 (-91.33%)
Contact.shAn OSINT tool to find contacts in order to report security vulnerabilities.
Stars: ✭ 216 (+10.2%)
IkyOSINT Project
Stars: ✭ 203 (+3.57%)
RenginereNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+1654.59%)
Leakfa.comA simple way to know if you are on the list of major security breaches like "HIBP", but it is specific for Iran.
Stars: ✭ 106 (-45.92%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (-77.04%)
Thehive4pyPython API Client for TheHive
Stars: ✭ 143 (-27.04%)
DfirtrackDFIRTrack - The Incident Response Tracking Application
Stars: ✭ 232 (+18.37%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (-10.2%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-85.2%)
INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-83.67%)
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-87.24%)
Docker-TemplatesDocker configurations for TheHive, Cortex and 3rd party tools
Stars: ✭ 71 (-63.78%)
uacUAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+32.65%)
ArgosThis script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (-62.76%)
fastfinderIncident Response - Fast suspicious file finder
Stars: ✭ 116 (-40.82%)
DDTTXDDTTX Tabletop Trainings
Stars: ✭ 22 (-88.78%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+539.29%)
KarmaFind leaked emails with your passwords
Stars: ✭ 154 (-21.43%)
Sherlock JsFind usernames across over 170 social networks - Fast & flexible remake of sdushantha/sherlock
Stars: ✭ 153 (-21.94%)
IvreNetwork recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+1089.29%)
Tlosint LiveTrace Labs OSINT Linux Distribution based on Kali.
Stars: ✭ 151 (-22.96%)
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Stars: ✭ 2,758 (+1307.14%)
SingularitySingularity: Application containers for Linux
Stars: ✭ 2,290 (+1068.37%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-22.45%)
Amitt frameworkRepo replaced by cogsec-collaborative/AMITT
Stars: ✭ 152 (-22.45%)
LinuxforensicsEverything related to Linux Forensics
Stars: ✭ 189 (-3.57%)
Misp WarninglistsWarning lists to inform users of MISP about potential false-positives or other information in indicators
Stars: ✭ 184 (-6.12%)
AutosintTool to automate common OSINT tasks
Stars: ✭ 150 (-23.47%)
OpensquatDetection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (-23.98%)
Securityadvisories🔐 Security advisories as a simple composer exclusion list, updated daily
Stars: ✭ 2,279 (+1062.76%)
AlephnoteLightweight note taking client for Simplenote or Standard Notes (or simply local storage)
Stars: ✭ 149 (-23.98%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-24.49%)
OsctrlFast and efficient osquery management
Stars: ✭ 183 (-6.63%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+1079.59%)
SleuthkitThe Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
Stars: ✭ 1,948 (+893.88%)
KinglyZero-cost state-machine library for robust, testable and portable user interfaces (most machines compile ~1-2KB)
Stars: ✭ 147 (-25%)
MyriamA vulnerable iOS App with Security Challenges for the Security Researcher inside you.
Stars: ✭ 146 (-25.51%)
Messenger For DesktopThis is not an official Facebook product, and is not affiliated with, or sponsored or endorsed by, Facebook.
Stars: ✭ 2,180 (+1012.24%)
Sbt Dependency CheckSBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (-4.59%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-7.14%)
Aurora Incident ResponseIncident Response Documentation made easy. Developed by Incident Responders for Incident Responders
Stars: ✭ 171 (-12.76%)
Portable.xamlPortable .NET library for reading/writing xaml files.
Stars: ✭ 145 (-26.02%)
WincmdfuWindows one line commands that make life easier, shortcuts and command line fu.
Stars: ✭ 145 (-26.02%)