ElevenPaths / siemframework
☆41Updated last year
Related projects ⓘ
Alternatives and complementary repositories for siemframework
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆68Updated last year
- Repository of resources for configuring a Red Team SIEM using Elastic☆98Updated 6 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- nse script to inject jndi payloads☆45Updated 2 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆43Updated 6 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆44Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last week
- The New Hacking Framework☆18Updated 7 years ago
- ☆41Updated 7 months ago
- Automated Penetration Testing Framework☆35Updated 5 years ago
- Collaborative pentest tool with highly customizable tools☆71Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆27Updated 6 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago
- Scout - a Contactless Active Reconnaissance Tool☆51Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- ☆21Updated last year
- Defence Against the Dark Arts☆34Updated 5 years ago
- Virtual Security Operations Center☆49Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago
- ☆29Updated 6 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 5 years ago
- Threat Hunter's Knowledge Base☆22Updated 2 years ago
- ☆41Updated last month
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- Wrap any binary into a cached webserver☆53Updated 2 years ago