CERT-MC / USB-whitelistingLinks
Limit USB devices plugged to a linux host
☆12Updated 7 years ago
Alternatives and similar repositories for USB-whitelisting
Users that are interested in USB-whitelisting are comparing it to the libraries listed below
Sorting:
- Modern Honey Network App for Splunk☆50Updated 6 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Updated 9 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 10 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 8 years ago
- Honeypot repo☆48Updated 10 years ago
- Harbinger Threat Intelligence☆83Updated 10 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Quickly generate snort rules for IOCs☆18Updated 10 years ago
- Bro scripts to be shared with the community☆111Updated 12 years ago
- Repo for autosnort scripts.☆156Updated 5 years ago
- Modified edition of cuckoo☆18Updated 7 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆52Updated 10 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 10 months ago
- IntelMQ Manager is a graphical interface to manage configurations for IntelMQ framework.☆108Updated last month
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- Miscelaneous useful scripts for my day to day projects☆123Updated 5 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆41Updated 13 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- Python script to pull various IOCs from PDFs☆15Updated 11 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 9 months ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago
- Cert Michelin Awareness Card Game repository☆15Updated 8 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98Updated 9 years ago
- ☆50Updated 5 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆128Updated 10 years ago
- pastebin.com Content Monitoring Tool☆194Updated 13 years ago