MutableSecurity / mutablesecurityLinks
CLI program for automating the setup, configuration, and use of cybersecurity solutions
☆47Updated 2 years ago
Alternatives and similar repositories for mutablesecurity
Users that are interested in mutablesecurity are comparing it to the libraries listed below
Sorting:
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆258Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 3 years ago
- Source code and examples for Antignis☆43Updated 2 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆167Updated last year
- Data visualization for blue teams☆126Updated 2 years ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 9 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- ☆80Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- God Mode Detection Rules☆134Updated last year
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Updated 2 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆37Updated 3 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated 10 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆162Updated 3 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 8 months ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆84Updated last year
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆106Updated 2 weeks ago
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated last week
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated last week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆179Updated 7 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 3 weeks ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated 4 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 8 months ago
- CLI component of OWASP PurpleTeam☆131Updated last year