Clinv Logo

Clinv

0
Free
Visit Website

WARNING: the program is still in development and not stable even though it's on version 1.x.y. Use at your own risk.* Clinv DevSecOps command line asset inventory Help See documentation for more details. Installing pip install clinv Contributing For guidance on setting up a development environment, and how to make a contribution to clinv, see Contributing to clinv. Donations or If you are using some of my open-source tools, have enjoyed them, and want to say "thanks", this is a very strong way to do it. If your product/company depends on these tools, you can sponsor me to ensure I keep happily maintaining them. If these tools are helping you save money, time, effort, or frustrations; or they are helping you make money, be more productive, efficient, secure, enjoy a bit more your work, or get your product ready faster, this is a great way to show your appreciation. Thanks for that! And by sponsoring me, you are helping make these tools, that already help you, sustainable and healthy. License GPLv3

FEATURES

ALTERNATIVES

Repository of default playbooks and custom functions for Splunk SOAR instances with content migration to Splunk's GitHub.

Detect signed malware and track stolen code-signing certificates using osquery.

A multi-platform open source tool for triaging suspect systems and hunting for Indicators of Compromise (IOCs) across thousands of endpoints.

Incident response and case management solution for efficient incident response and management.

A custom activity repository for Ayehu NG automation platform, allowing users to create and modify activities to fit their specific needs.

PowerGRR is a PowerShell module for the GRR API, allowing automation and scripting for incident response and remote live forensics.

A security operations platform that provides automated threat detection, access control, and protection against various online attacks through Cloudflare integration.

A modular incident response framework in Powershell that uses Powershell Remoting to collect data for incident response and breach hunts.