ImpostorKeanu / sec-vault-gen
Python utility to generate filesystem content for Obsidian.
☆84Updated last year
Alternatives and similar repositories for sec-vault-gen:
Users that are interested in sec-vault-gen are comparing it to the libraries listed below
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆138Updated 9 months ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated this week
- A repo to support the book☆108Updated 3 years ago
- ☆47Updated 3 weeks ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Simple parser to get useful information from AWS S3 logs☆26Updated 3 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆70Updated 4 months ago
- Active Directory Purple Team Playbook☆108Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated last year
- ☆36Updated 10 months ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆134Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- ☆63Updated 3 years ago
- ☆79Updated 5 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆41Updated last month
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆88Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆150Updated 2 years ago
- A GUI to query the API of abuse.ch.☆70Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated last month
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆44Updated last year
- Full of public notes and Utilities☆98Updated 2 months ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated last month
- God Mode Detection Rules☆134Updated 9 months ago
- Mass target enumeration☆28Updated 4 years ago