Clinv Logo

Clinv

0
Free
Visit Website

WARNING: the program is still in development and not stable even though it's on version 1.x.y. Use at your own risk.* Clinv DevSecOps command line asset inventory Help See documentation for more details. Installing pip install clinv Contributing For guidance on setting up a development environment, and how to make a contribution to clinv, see Contributing to clinv. Donations or If you are using some of my open-source tools, have enjoyed them, and want to say "thanks", this is a very strong way to do it. If your product/company depends on these tools, you can sponsor me to ensure I keep happily maintaining them. If these tools are helping you save money, time, effort, or frustrations; or they are helping you make money, be more productive, efficient, secure, enjoy a bit more your work, or get your product ready faster, this is a great way to show your appreciation. Thanks for that! And by sponsoring me, you are helping make these tools, that already help you, sustainable and healthy. License GPLv3

FEATURES

ALTERNATIVES

An automation platform with community support and documentation for easy development.

A web collaborative platform for incident responders to share technical details during investigations, shipped in Docker containers for easy installation and upgrades.

An investigative analytics platform that uses machine learning to fuse and analyze data from multiple sources, enabling security organizations to extract insights and identify patterns for threat prevention and complex investigations.

A security analytics platform that integrates with Google Chronicle to deliver Autonomic Security Operations through data engineering, detection engineering, and response engineering.

A Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting.

Repository of templates for Ayehu's workflows with the ability to design, execute, and automate IT and business processes.

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

A public incident response process documentation used at PagerDuty

PINNED