CiscoCXSecurity / unix-auditLinks
Framework for generating audit commands for Unix security audits
☆66Updated 2 years ago
Alternatives and similar repositories for unix-audit
Users that are interested in unix-audit are comparing it to the libraries listed below
Sorting:
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated 2 years ago
- Covert data exfiltration via DNS☆47Updated 6 months ago
- create a "simulated internet" cyber range environment☆17Updated 2 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated last year
- ☆54Updated 7 months ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- ☆19Updated last year
- Yara Rules for Modern Malware☆78Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- ☆33Updated last year
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated last year
- POC tool to abuse windows server failover clusters☆25Updated this week
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- ☆27Updated 8 months ago
- ☆20Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- ☆32Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- ☆18Updated last year
- Timestomp Tool to flatten MAC times with a specific timestamp☆48Updated 3 months ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 10 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- Linux #rootkit and #malware revealer☆26Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago