Acheron-VAF / AcheronLinks
Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.
☆34Updated 3 years ago
Alternatives and similar repositories for Acheron
Users that are interested in Acheron are comparing it to the libraries listed below
Sorting:
- ☆21Updated 2 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 11 months ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- ☆39Updated 5 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- ☆30Updated 7 years ago
- ☆56Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Updated 2 years ago
- Automatically exported from code.google.com/p/nipper-ng☆73Updated 3 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 4 years ago
- An analytical framework for network traffic and behavioral analytics☆22Updated 2 years ago
- an awesome list of active defense resources☆127Updated 5 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated 2 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- ☆78Updated last month
- ☆77Updated 6 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆108Updated 3 months ago
- Let's obscure some IPv4 addresses☆37Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆56Updated 4 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- SANS Slingshot Linux Distribution☆55Updated 5 years ago