CRED-CLUB / ARTIFLinks
An advanced real time threat intelligence framework to identify threats and malicious web traffic on the basis of IP reputation and historical data.
☆245Updated 2 years ago
Alternatives and similar repositories for ARTIF
Users that are interested in ARTIF are comparing it to the libraries listed below
Sorting:
- DIAL(Did I Alert Lambda?) is a centralised security misconfiguration detection framework which completely runs on AWS Managed services li…☆88Updated 2 years ago
- firedrill is a malware simulation harness for evaluating your security controls☆184Updated last year
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆206Updated 2 months ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆124Updated last year
- JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.☆155Updated 3 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆297Updated 2 years ago
- An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE☆48Updated 4 months ago
- Tool to discover external and internal network attack surface☆198Updated last year
- UPI Reconnaissance tool☆114Updated 2 years ago
- A command line tool for UPI payment address discovery and reconnaissance☆73Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Cloud Security Operations Orchestrator☆185Updated last year
- Hfinger - fingerprinting HTTP requests☆137Updated 2 years ago
- Linux Evidence Acquisition Framework☆118Updated 8 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 3 months ago
- Resources, Tips, Tricks , Resources, Notes and much more☆21Updated 2 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- A GitHub recon/monitoring tool for finding internal leaks belonging to your organisation.☆90Updated last year
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆248Updated 2 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated 2 years ago
- ☆243Updated 10 months ago
- ☆126Updated 10 months ago
- The only open-source tool to analyze vulnerabilities and configuration issues with running docker container(s) and docker networks.☆128Updated 2 years ago
- macOS persistence tool☆225Updated 3 years ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 4 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- Phishing Framework for Pentesters☆168Updated 2 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆164Updated 11 months ago
- Tools for investigating Log4j CVE-2021-44228☆95Updated 3 years ago