Acheron-VAF / Vulnerability-Assessment-Framework
☆11Updated 8 years ago
Alternatives and similar repositories for Vulnerability-Assessment-Framework:
Users that are interested in Vulnerability-Assessment-Framework are comparing it to the libraries listed below
- ☆21Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- ☆33Updated 3 months ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- ☆11Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 7 years ago
- ☆30Updated 6 years ago
- HoneyDB Python Module☆13Updated last year
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Updated 5 years ago
- Python bindings for Yeti's API☆18Updated last year
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 4 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- ☆15Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago