ElevenPaths / siemframeworkLinks
☆42Updated 2 years ago
Alternatives and similar repositories for siemframework
Users that are interested in siemframework are comparing it to the libraries listed below
Sorting:
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Virtual Security Operations Center☆50Updated last year
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- A toolkit to attack Office365☆16Updated 5 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆42Updated last year
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 3 weeks ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆29Updated 7 months ago
- ☆69Updated 3 years ago
- ☆29Updated 4 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Principles of MITRE ATT&CK in the fraud domain☆34Updated 6 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- Import Nmap scans to Cherrytree☆37Updated 2 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago