OpenAEV-Platform / dockerLinks
OpenAEV Docker deployment helpers
☆24Updated last week
Alternatives and similar repositories for docker
Users that are interested in docker are comparing it to the libraries listed below
Sorting:
- Finding ClickFix and FakeCAPTCHA like it's 1999☆99Updated this week
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆30Updated last year
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆31Updated 3 weeks ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 9 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆159Updated 6 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆120Updated last month
- ☆74Updated 2 weeks ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Updated 11 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated 4 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆32Updated 7 months ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆48Updated 3 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- DShield Sensor Log Collection with ELK☆42Updated last month
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆49Updated 6 months ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- Helm chart for Open Cyber Threat Intelligence Platform☆29Updated this week
- MISP Playbooks☆215Updated last week
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆57Updated 3 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 6 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆72Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆78Updated 2 months ago
- ☆31Updated 2 years ago
- Wazuh integration TheHive☆39Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 7 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆131Updated last year