A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks including Phishing Email Analysis & Brand Monitoring to fasten the incident response.
☆29Jun 22, 2022Updated 3 years ago
Alternatives and similar repositories for Security-Event-Analysis-Automation-Tool
Users that are interested in Security-Event-Analysis-Automation-Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Jan 31, 2023Updated 3 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- A library implementing a generic SQL like query language.☆21Updated this week
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- Analyst Tool to automate some of an analyst's daily investigation tasks. In both python script and Jupyter Notebook format.☆15Nov 24, 2025Updated 3 months ago
- ☆14Dec 28, 2020Updated 5 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆11Mar 2, 2020Updated 6 years ago
- Minified version of Project Sherlock written in GO. Lookup given username from 1000 social networks☆31Oct 19, 2023Updated 2 years ago
- ☆16Jan 29, 2023Updated 3 years ago
- ☆17Mar 22, 2024Updated 2 years ago
- Squatm3gator is a complete web solution based on the python tool squatm3, designed to enumerate available domains generated modifying the…☆32Jan 21, 2026Updated 2 months ago
- ☆16Jul 8, 2024Updated last year
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- Goldphish phishing server with ngrok tunneling support.☆19Sep 7, 2018Updated 7 years ago
- ☆10Apr 29, 2023Updated 2 years ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- ☆10Jan 24, 2022Updated 4 years ago
- ☆11Jan 14, 2021Updated 5 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- Fork of OpenSearch Dashboards Security Plugin.☆12Updated this week
- ☆195Mar 11, 2024Updated 2 years ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,467Sep 25, 2024Updated last year
- Look into EDR events from network☆25Nov 20, 2025Updated 4 months ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- Theary is a fake SMTP server with a minimalist webmail client☆26Apr 27, 2014Updated 11 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 2 months ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- ASW Card Validator library validates masking and card numbers, with the help of Luhn's algorithm using Angular. Identify card type VISA, …☆14Nov 9, 2024Updated last year
- Homebrew MCP : Comprehensive brew support for installing, upgrading, searching, and maintaining macOS packages.☆25Jun 23, 2025Updated 9 months ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- Course Setup for the Cybersecurity Defender in 4 weeks course by Omar Santos☆20Jul 29, 2021Updated 4 years ago
- An npm package that allows you to generate Nigerian data like names, banks, emails, states and more.☆11Jul 20, 2020Updated 5 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 6 months ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- Search a list of domains on the wayback machine☆15Jun 8, 2019Updated 6 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- Create accounts on textnow.com automatically, bypass reCaptcha with 2captcha.com API☆12Nov 11, 2017Updated 8 years ago