MutableSecurity / mutablesecurityLinks
CLI program for automating the setup, configuration, and use of cybersecurity solutions
☆50Updated 2 years ago
Alternatives and similar repositories for mutablesecurity
Users that are interested in mutablesecurity are comparing it to the libraries listed below
Sorting:
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆169Updated last year
- Source code and examples for Antignis☆44Updated 3 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 3 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆48Updated 2 years ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆113Updated last year
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆257Updated last year
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆88Updated 2 weeks ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆195Updated this week
- Data visualization for blue teams☆126Updated 3 years ago
- God Mode Detection Rules☆135Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆113Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- ☆18Updated 4 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆56Updated 3 months ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- Open Source External Attack Surface Management☆49Updated last year
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆246Updated 2 weeks ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- Threat Intel Platform for T-POTs☆165Updated this week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Add a layer of active defense to your cloud applications.☆103Updated last week
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Updated last year
- Docker container for the gophish phishing framework.☆52Updated 3 weeks ago
- Traps web spiders☆79Updated 5 years ago