CiscoCXSecurity / unix-auditLinks
Framework for generating audit commands for Unix security audits
☆66Updated last year
Alternatives and similar repositories for unix-audit
Users that are interested in unix-audit are comparing it to the libraries listed below
Sorting:
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Some Cheat Sheet for Red Team☆16Updated 2 years ago
- ☆54Updated 7 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- Linux #rootkit and #malware revealer☆26Updated 11 months ago
- ☆20Updated last year
- ☆19Updated last year
- AutoPoC Generator HoneyPoC☆35Updated 2 months ago
- PowerShell Script Analyzer☆69Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Presentaciones de congresos☆53Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated last year
- create a "simulated internet" cyber range environment☆17Updated last month
- ☆18Updated last year
- Some of my rough notes for Docker threat detection☆47Updated last year
- ☆30Updated 2 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 10 months ago
- self-hosted Azure OSINT tool☆31Updated 3 weeks ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆50Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆22Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Covert data exfiltration via DNS☆47Updated 5 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated 2 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 2 months ago
- Yara Rules for Modern Malware☆77Updated last year
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 3 years ago