Collection of Auditd Examples and Presentations
☆88Oct 16, 2020Updated 5 years ago
Alternatives and similar repositories for auditd-examples
Users that are interested in auditd-examples are comparing it to the libraries listed below
Sorting:
- The Auditd Framework logs and applies security policy to linux auditd data☆15Jan 26, 2018Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Puppet module for Auditd☆41Jan 26, 2021Updated 5 years ago
- Source code of http://howihacked.info☆16Jan 28, 2016Updated 10 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆822Jul 8, 2020Updated 5 years ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 4 years ago
- A parser/timeline creator for auditd logs.☆16Aug 5, 2014Updated 11 years ago
- OWASP Ukraine 2019 CTF☆12Feb 10, 2023Updated 3 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- ☆13Jan 20, 2020Updated 6 years ago
- ☆13Dec 12, 2021Updated 4 years ago
- KVM Virtualization scripts☆16Oct 11, 2016Updated 9 years ago
- ☆14May 30, 2018Updated 7 years ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- A central place for me to share interesting PSRemoting configurations☆16Jun 28, 2017Updated 8 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- ☆17Mar 22, 2018Updated 7 years ago
- ☆13Aug 1, 2017Updated 8 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- a place to have conversations about OpenControl projects☆17Apr 30, 2019Updated 6 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- A simple provider to analyse what gets passed into Microsoft's Anti-Malware Scan Interface☆17Jan 10, 2020Updated 6 years ago