Fallenour / VenatorLinks
Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and firewall search, collects screenshots, generates report, injects captured artifacts into report, saves generated report with artifacts into a specified directory
☆21Updated 8 years ago
Alternatives and similar repositories for Venator
Users that are interested in Venator are comparing it to the libraries listed below
Sorting:
- ☆76Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- ☆30Updated 6 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- ☆53Updated 7 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 7 months ago
- 504 VSAgent☆23Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Create a MS Word index file from PowerPoint notes and slides☆44Updated 4 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Expert Investigation Guides☆52Updated 4 years ago
- Credential Phish Analysis and Automation☆97Updated 6 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Site for IWS book content☆18Updated 6 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Deploy MISP Project software with Vagrant.☆43Updated 5 years ago
- Find potential Indicators of Compromise among similar Linux servers☆29Updated 7 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- No-Script Automation Tool☆56Updated 6 years ago
- Repository for my ATT&CK analysis research.☆69Updated 6 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- automate your MISP installs☆68Updated 5 years ago