KevinGage / MacMonLinks
Monitors the network for new connected MAC addresses
☆17Updated 2 years ago
Alternatives and similar repositories for MacMon
Users that are interested in MacMon are comparing it to the libraries listed below
Sorting:
- ☆33Updated 3 years ago
- Collection of useful Canary tools☆92Updated 3 weeks ago
- Dockerfiles for containerized osquery☆14Updated 8 years ago
- ☆55Updated 4 years ago
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆63Updated 2 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Ansible playbook for installing MineMeld on Linux☆48Updated 4 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 2 months ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆68Updated 5 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Updated last year
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- ☆120Updated last week
- An ELK environment containing interesting security datasets.☆138Updated 5 years ago
- ☆34Updated 4 years ago
- Remote Memory Acquisition Tool☆251Updated 5 years ago
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- This script is used to generate some basic detections of the aws security services☆71Updated 3 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆93Updated 3 years ago
- ☆42Updated 4 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- Unleash the power of the Falcon Platform at the CLI☆132Updated last month
- ☆77Updated this week
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆82Updated last week
- Web application to create indexes for GIAC certification examinations.☆146Updated 2 years ago