KevinGage / MacMonLinks
Monitors the network for new connected MAC addresses
☆17Updated 2 years ago
Alternatives and similar repositories for MacMon
Users that are interested in MacMon are comparing it to the libraries listed below
Sorting:
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- A Docker container for remote penetration testing.☆140Updated 4 years ago
- ☆33Updated 3 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆138Updated 4 years ago
- Collection of useful Canary tools☆91Updated 2 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack☆27Updated 5 years ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Updated last year
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆68Updated 5 years ago
- Remote Memory Acquisition Tool☆251Updated 5 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆14Updated 5 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- An ELK environment containing interesting security datasets.☆137Updated 5 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- ☆42Updated 4 years ago
- ☆55Updated 4 years ago
- ☆119Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Crack passwords using Terraform and AWS☆43Updated 6 years ago
- Web application to create indexes for GIAC certification examinations.☆146Updated 2 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 7 years ago
- ☆21Updated 6 years ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆53Updated 5 years ago
- A curated list of Awesome Threat Intelligence resources☆48Updated 7 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆63Updated 2 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆71Updated 5 years ago