KevinGage / MacMonLinks
Monitors the network for new connected MAC addresses
☆17Updated 3 years ago
Alternatives and similar repositories for MacMon
Users that are interested in MacMon are comparing it to the libraries listed below
Sorting:
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 4 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆34Updated 3 years ago
- ☆120Updated last week
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 3 years ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Updated 2 months ago
- Collection of useful Canary tools☆93Updated last week
- Elastic Beat for fetching and shipping Office 365 audit events☆68Updated 5 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆139Updated 4 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- This script is used to generate some basic detections of the aws security services☆72Updated 3 years ago
- Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack☆27Updated 6 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆77Updated 5 years ago
- ☆77Updated 3 years ago
- ☆56Updated 4 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 5 months ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- ☆33Updated 3 years ago
- A set of tools and procedures for automating NSM and NIDS deployments in AWS☆16Updated 5 years ago
- An ELK environment containing interesting security datasets.☆137Updated 5 years ago
- ☆42Updated 5 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 3 months ago
- ☆73Updated 2 years ago
- Integration for Jira ticket creation from Tenable vulnerability scans☆17Updated 6 years ago
- Cloud Security Operations Orchestrator☆188Updated last year