MutableSecurity / mutablesecurityLinks
CLI program for automating the setup, configuration, and use of cybersecurity solutions
☆50Updated 2 years ago
Alternatives and similar repositories for mutablesecurity
Users that are interested in mutablesecurity are comparing it to the libraries listed below
Sorting:
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆104Updated last year
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆168Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆110Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆257Updated last year
- Data visualization for blue teams☆126Updated 2 years ago
- A web application to streamline the development of STIGs from SRGs☆82Updated last month
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆41Updated 11 months ago
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆34Updated 9 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated last month
- Wazuh integration TheHive☆40Updated 2 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- Threat Intel Platform for T-POTs☆159Updated this week
- an awesome list of active defense resources☆127Updated 5 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago
- Source code and examples for Antignis☆44Updated 3 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 3 months ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆22Updated last year
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆55Updated 4 years ago
- Security Information and Event Management in Minecraft☆120Updated 3 years ago
- God Mode Detection Rules☆134Updated last year
- OpenAEV Docker deployment helpers☆26Updated last week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆54Updated last month
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆182Updated last week
- Passive OS detection based on SYN packets without Transmitting any Data☆49Updated 2 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆49Updated 6 months ago