MutableSecurity / mutablesecurity
CLI program for automating the setup, configuration, and use of cybersecurity solutions
☆43Updated last year
Related projects: ⓘ
- Source code and examples for Antignis☆36Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆33Updated 8 months ago
- ☆78Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated last year
- High signal information security sources Goggle.☆66Updated last year
- A GUI to query the API of abuse.ch.☆69Updated 2 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆39Updated last year
- Threat Simulator for Enterprise Networks☆12Updated 2 years ago
- ☆55Updated 2 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆47Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆48Updated 2 weeks ago
- Automation tool for Windows Deception Host Burn-In☆71Updated 2 months ago
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆65Updated 5 months ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆48Updated last month
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆45Updated last year
- ☆37Updated this week
- Passive OS detection based on SYN packets without Transmitting any Data☆43Updated last year
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆28Updated 8 months ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆34Updated last month
- Security Information and Event Management in Minecraft☆115Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆54Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated last year
- CrowdStrike's Open Source Policy & Contribution Guide☆35Updated last year
- A walkthrough on how I set up Microsoft Server 2019 on a Virtual Machine to run Active Directory on it. I then configure a Domain Control…☆47Updated last year
- Harvest Linux forensic data for operational triage of an event.☆51Updated 3 months ago
- Spoofpoint is a domain monitoring tool that allows you to generate a list of domains that are 1 character off of your domain (grahamhelto…☆37Updated 5 months ago
- WordPress version identification and vulnerability finder.☆28Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆61Updated 5 months ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆28Updated 2 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆40Updated this week