Fallenour / Venator
Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and firewall search, collects screenshots, generates report, injects captured artifacts into report, saves generated report with artifacts into a specified directory
☆21Updated 7 years ago
Alternatives and similar repositories for Venator:
Users that are interested in Venator are comparing it to the libraries listed below
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- 504 VSAgent☆23Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Site for IWS book content☆18Updated 6 years ago
- ☆76Updated 6 years ago
- ☆30Updated 6 years ago
- ☆52Updated 6 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Python script to automatically create sigma rules from The hive observables☆23Updated 5 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- ☆12Updated 5 years ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Splunk app for Threat hunting☆15Updated 6 years ago
- Splunk integration with MISP☆12Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 3 months ago
- ☆17Updated 7 years ago
- ☆14Updated 6 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- ☆25Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- ☆41Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago