MutableSecurity / mutablesecurity
CLI program for automating the setup, configuration, and use of cybersecurity solutions
☆45Updated last year
Alternatives and similar repositories for mutablesecurity:
Users that are interested in mutablesecurity are comparing it to the libraries listed below
- Source code and examples for Antignis☆36Updated 2 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆107Updated 2 years ago
- A GUI to query the API of abuse.ch.☆70Updated 2 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆165Updated 7 months ago
- Data visualization for blue teams☆124Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆106Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆95Updated 6 months ago
- A list of awesome penetration testing tools and resources.☆79Updated last year
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆33Updated 5 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆46Updated 9 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆68Updated last year
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆114Updated 6 months ago
- Free cybersecurity training resources☆10Updated 4 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆206Updated last month
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 9 months ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆50Updated 3 years ago
- ☆64Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆21Updated last month
- ☆79Updated last year
- Shodan Monitoring integration for TheHive.☆130Updated last month
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- CrowdStrike's Open Source Policy & Contribution Guide☆39Updated last year
- A collection of sources of documentation and best practices to build and run a SOC☆42Updated 2 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆49Updated 2 years ago
- an awesome list of active defense resources☆116Updated 4 years ago
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆78Updated 10 months ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 3 years ago