MutableSecurity / mutablesecurityLinks
CLI program for automating the setup, configuration, and use of cybersecurity solutions
☆47Updated 2 years ago
Alternatives and similar repositories for mutablesecurity
Users that are interested in mutablesecurity are comparing it to the libraries listed below
Sorting:
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆111Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆99Updated last year
- Source code and examples for Antignis☆43Updated 2 years ago
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆258Updated last year
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆166Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆80Updated 3 weeks ago
- A walkthrough on how I set up Microsoft Server 2019 on a Virtual Machine to run Active Directory on it. I then configure a Domain Control…☆62Updated 2 years ago
- Data visualization for blue teams☆126Updated 2 years ago
- ☆68Updated 4 years ago
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆101Updated last year
- ☆80Updated 2 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆103Updated last month
- Automation tool for Windows Deception Host Burn-In☆86Updated 8 months ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 3 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆36Updated 3 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 2 months ago
- Shodan Monitoring integration for TheHive.☆131Updated 8 months ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆53Updated 2 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last year
- God Mode Detection Rules☆134Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆32Updated 4 months ago
- Create a SOC lab with SIEM, AD, Workstation, Firewall, Sysmon, IPS. Step by Step☆30Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- OpenBAS Docker deployment helpers☆23Updated this week
- ☆19Updated 3 years ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 7 months ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆26Updated 2 years ago