MutableSecurity / mutablesecurityLinks
CLI program for automating the setup, configuration, and use of cybersecurity solutions
☆47Updated 2 years ago
Alternatives and similar repositories for mutablesecurity
Users that are interested in mutablesecurity are comparing it to the libraries listed below
Sorting:
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated 5 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆167Updated last year
- Data visualization for blue teams☆126Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆257Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Updated 10 months ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆52Updated this week
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- God Mode Detection Rules☆134Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆34Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- A walkthrough on how I set up Microsoft Server 2019 on a Virtual Machine to run Active Directory on it. I then configure a Domain Control…☆63Updated 2 years ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆85Updated last month
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆54Updated 4 years ago
- POSIX script for mail security checks of domain names☆76Updated 2 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated 11 months ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆108Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated this week
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆76Updated last week
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆106Updated 2 weeks ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago