CLI program for automating the setup, configuration, and use of cybersecurity solutions
β50Feb 12, 2023Updated 3 years ago
Alternatives and similar repositories for mutablesecurity
Users that are interested in mutablesecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Subdomain finderβ10Mar 13, 2025Updated last year
- π΅οΈββοΈ Find, locate, and query files for ops and security experts β‘οΈβ‘οΈβ‘οΈβ36Dec 18, 2022Updated 3 years ago
- Sample queries for Advanced hunting in Windows Defender ATPβ11Apr 22, 2020Updated 6 years ago
- Python command line tool used for generating GIAC Certification indexes.β31Jul 17, 2023Updated 2 years ago
- Virtual Lab builder and playerβ15Aug 25, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automated Phishing Toolβ11May 27, 2020Updated 5 years ago
- Scan git repos for secrets using regex and entropy πβ10Jun 18, 2020Updated 5 years ago
- An experimental Velociraptor implementation using cloud infrastructureβ26Dec 2, 2025Updated 5 months ago
- A CLI tool for managing Chronicle user workflowsβ18Apr 13, 2026Updated 3 weeks ago
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.β29Mar 19, 2024Updated 2 years ago
- Convert Nmap output for integration with other Project Discovery toolsβ15Apr 2, 2023Updated 3 years ago
- Postfix SMTP Smuggling - Expect Script POCβ23Dec 26, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.β37Nov 16, 2023Updated 2 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.β15Apr 28, 2026Updated last week
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- TCP reverse shell written in C# with the option to choose between Windows command prompt or MS powershell.β26May 9, 2019Updated 6 years ago
- Disk Image Mounting Scriptβ11Jan 22, 2026Updated 3 months ago
- A wifi-enabled touch light for keeping in contact with friends and familyβ13Feb 25, 2025Updated last year
- Run Velociraptor on Security Onionβ41Jul 27, 2022Updated 3 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by developβ¦β26Jun 30, 2021Updated 4 years ago
- KQL Queriesβ39Updated this week
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive Kβ¦β13Jan 10, 2021Updated 5 years ago
- Thor Artifacts for Velociraptorβ19Dec 2, 2025Updated 5 months ago
- SystemBanner is an application used to display relevant security classification information about the Windows systems it runs on.β15Nov 17, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This is a repo for camphish tool for kali linux develop by thelinuxchoise and techchipβ13Nov 2, 2023Updated 2 years ago
- fork of: a remix on the work of HarryFun's MorphingClock by imirelβ12Jul 25, 2019Updated 6 years ago
- A curated list of FOSS software appliances for building a SOCβ18Jan 11, 2021Updated 5 years ago
- AREDN Mesh Mapβ13Apr 14, 2026Updated 2 weeks ago
- Small and highly portable detection tests based on MITRE's ATT&CK.β10Feb 17, 2025Updated last year
- β11Mar 2, 2023Updated 3 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detecβ¦β11Dec 4, 2018Updated 7 years ago
- Meshtastic for outdated and unsupported devices , we deserve to exist too! join the corner for vintage hardware curatorsβ17Sep 15, 2025Updated 7 months ago
- Automated Red Team Infrastructure deployement using Dockerβ1,266Aug 24, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Wireless Emulation Link Layer Exchange Daemon. These applications are used to extend a mac80211_hwsim simulation across multiple VMs and β¦β39Apr 25, 2026Updated last week
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help teβ¦β44Sep 8, 2020Updated 5 years ago
- Scripts to generate an Internet simulationβ37Aug 6, 2024Updated last year
- Fork of ReactOS (Cmd.exe), IRTriage Command Line Interpreterβ20Jun 4, 2018Updated 7 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bountyβ43Jun 1, 2023Updated 2 years ago
- β12Mar 23, 2022Updated 4 years ago
- Build your own cloud virtual machine labβ13Nov 25, 2025Updated 5 months ago