CRED-CLUB / ARTIFLinks
An advanced real time threat intelligence framework to identify threats and malicious web traffic on the basis of IP reputation and historical data.
☆247Updated 2 years ago
Alternatives and similar repositories for ARTIF
Users that are interested in ARTIF are comparing it to the libraries listed below
Sorting:
- DIAL(Did I Alert Lambda?) is a centralised security misconfiguration detection framework which completely runs on AWS Managed services li…☆94Updated 2 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- The only open-source tool to analyze vulnerabilities and configuration issues with running docker container(s) and docker networks.☆127Updated 2 years ago
- An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE☆48Updated 7 months ago
- Resources, Tips, Tricks , Resources, Notes and much more☆21Updated 2 years ago
- firedrill is a malware simulation harness for evaluating your security controls☆188Updated last year
- Tool to discover external and internal network attack surface☆203Updated last year
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆207Updated 4 months ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆158Updated last year
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- Hfinger - fingerprinting HTTP requests☆139Updated 2 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated 2 weeks ago
- Cloud Security Operations Orchestrator☆187Updated last year
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated last month
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 6 months ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated 2 years ago
- Unicode encoding attacks with machine learning☆97Updated 3 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆210Updated 4 years ago
- Typodetect☆74Updated 4 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆183Updated last week
- Red Team C2 Infrastructure built in AWS using Ansible!☆230Updated 4 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆157Updated 5 months ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Audit Windows Security with best Practice☆185Updated 11 months ago
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆293Updated 3 years ago
- automated password spraying tool☆147Updated 4 years ago
- Stringlifier is on Opensource ML Library for detecting random strings in raw text. It can be used in sanitising logs, detecting accidenta…☆167Updated 3 months ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 5 years ago
- JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.☆156Updated 3 years ago