Fallenour / VenatorLinks
Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and firewall search, collects screenshots, generates report, injects captured artifacts into report, saves generated report with artifacts into a specified directory
☆21Updated 8 years ago
Alternatives and similar repositories for Venator
Users that are interested in Venator are comparing it to the libraries listed below
Sorting:
- 504 VSAgent☆23Updated 7 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- ☆30Updated 6 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- ☆76Updated 7 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- ☆53Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- ☆25Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated 2 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 7 months ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 4 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- ☆14Updated 7 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆17Updated 5 years ago
- A collection of useful scripts☆24Updated 6 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated last year
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Splunk app for Threat hunting☆15Updated 6 years ago