CyberPipe VS threat-tools

Compare CyberPipe vs threat-tools and see what are their differences.

CyberPipe

An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations. (by dwmetz)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
CyberPipe threat-tools
2 1
264 151
- 0.7%
5.4 6.5
3 months ago 6 months ago
PowerShell Python
MIT License GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

CyberPipe

Posts with mentions or reviews of CyberPipe. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-09-30.

threat-tools

Posts with mentions or reviews of threat-tools. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-09-30.

What are some alternatives?

When comparing CyberPipe and threat-tools you can also consider the following projects:

pdfalyzer - Analyze PDFs. With colors. And Yara.

Awesome-Red-Teaming - List of Awesome Red Teaming Resources

MalwareSourceCode - Collection of malware source code for a variety of platforms in an array of different programming languages.

SysmonForLinux

VanillaWindowsReference - A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare and see what's been added with each update. Use these CSVs to create your own known good hash sets!

PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Malware-IOCs

Aurora-Incident-Response - Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders

awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.