ThehiveTheHive: a Scalable, Open Source and Free Security Incident Response Platform
Stars: ✭ 2,300 (+238.24%)
DfirtrackDFIRTrack - The Incident Response Tracking Application
Stars: ✭ 232 (-65.88%)
Thehive4pyPython API Client for TheHive
Stars: ✭ 143 (-78.97%)
catalystCatalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (-86.62%)
MemProcFS-AnalyzerMemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Stars: ✭ 89 (-86.91%)
CASECyber-investigation Analysis Standard Expression (CASE) Ontology
Stars: ✭ 46 (-93.24%)
BeagleBeagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (+43.53%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (-0.59%)
CortexCortex: a Powerful Observable Analysis and Active Response Engine
Stars: ✭ 676 (-0.59%)
KuiperDigital Forensics Investigation Platform
Stars: ✭ 257 (-62.21%)
ThehivedocsDocumentation of TheHive
Stars: ✭ 353 (-48.09%)
INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-95.29%)
DeepBeerInventory-RLThe code for the SRDQN algorithm to train an agent for the beer game problem
Stars: ✭ 27 (-96.03%)
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (-52.35%)
pos-billing-and-invoicing-softwareMost Advanced POS, Billing, Inventory & Invoicing Software which can perfectly fit on your WholeSale & Retail Business --- Demo :
Stars: ✭ 33 (-95.15%)
HowtheysreA curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliability Engineering (SRE)
Stars: ✭ 6,962 (+923.82%)
OpenboxesOpenBoxes is a supply chain management system designed to manage inventory and track stock movements for healthcare facilities.
Stars: ✭ 309 (-54.56%)
fastfinderIncident Response - Fast suspicious file finder
Stars: ✭ 116 (-82.94%)
artifactcollector🚨 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system
Stars: ✭ 140 (-79.41%)
Asp.net Core Inventory Order Management SystemProject example Asp.Net Core Mvc implementation of inventory order management system. warehouse, product, vendor, customer, purchase order, sales order, shipment, goods receive and more.
Stars: ✭ 301 (-55.74%)
pyaff4The Python implementation of the AFF4 standard.
Stars: ✭ 37 (-94.56%)
ForensicsToolsA list of free and open forensics analysis tools and other resources
Stars: ✭ 392 (-42.35%)
Osquery ConfigurationA repository for using osquery for incident detection and response
Stars: ✭ 618 (-9.12%)
FclFCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (-39.85%)
complianceLegal, procedural and policies document templates for operating an IRT
Stars: ✭ 57 (-91.62%)
appareloFrappe application to manage the manufacturing workflows in the garment industry. Reach us out at
[email protected] Stars: ✭ 26 (-96.18%)
UrlextractorInformation gathering & website reconnaissance | https://phishstats.info/
Stars: ✭ 341 (-49.85%)
OpcdeOPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (-20.88%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-96.76%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (-54.26%)
Cyberchef RecipesA list of cyber-chef recipes and curated links
Stars: ✭ 619 (-8.97%)
ir scriptsincident response scripts
Stars: ✭ 17 (-97.5%)
Apt HunterAPT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
Stars: ✭ 297 (-56.32%)
hotolotidocumentation, scripts, tools related to Zena Forensics (http://blog.digital-forensics.it)
Stars: ✭ 66 (-90.29%)
InvManOpen source JavaFX inventory management application
Stars: ✭ 40 (-94.12%)
ThreatpinchlookupDocumentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Stars: ✭ 257 (-62.21%)
MaroMulti-Agent Resource Optimization (MARO) platform is an instance of Reinforcement Learning as a Service (RaaS) for real-world resource optimization problems.
Stars: ✭ 378 (-44.41%)
GDPatrolA Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (-92.65%)
InfosecHouseInfosec resource center for offensive and defensive security operations.
Stars: ✭ 61 (-91.03%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (-10.15%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (-46.62%)
bits parserExtract BITS jobs from QMGR queue and store them as CSV records
Stars: ✭ 64 (-90.59%)
Red-Rabbit-V4The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (-81.91%)
SyntheticSunSyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats.
Stars: ✭ 49 (-92.79%)
EvilizeParses Windows event logs files based on SANS Poster
Stars: ✭ 24 (-96.47%)
PSTraceTrace ScriptBlock execution for powershell v2
Stars: ✭ 38 (-94.41%)
LinuxCatScaleIncident Response collection and processing scripts with automated reporting scripts
Stars: ✭ 143 (-78.97%)