CiscoCXSecurity / unix-auditLinks
Framework for generating audit commands for Unix security audits
☆66Updated 2 years ago
Alternatives and similar repositories for unix-audit
Users that are interested in unix-audit are comparing it to the libraries listed below
Sorting:
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- Yara Rules for Modern Malware☆78Updated last year
- ☆18Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- ☆55Updated last year
- ☆84Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Updated 6 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated last year
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- ☆49Updated 2 years ago
- Some Cheat Sheet for Red Team☆18Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- A pcap capture analysis helper☆25Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆62Updated last year
- ☆31Updated 2 years ago
- ☆34Updated 2 years ago
- Linux #rootkit and #malware revealer☆30Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Updated 2 years ago
- Detonate malware on VMs and get logs & detection status☆73Updated this week
- Docker container for running CobaltStrike 4.10☆37Updated last year
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- ☆70Updated 2 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Some of my rough notes for Docker threat detection☆48Updated 2 years ago