RedWolfIntelligence / Open-Source-Security-List-Links
This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to afford adequate security. We are firm believers that everyone deserves to be secure at a cost effective rate.
☆49Updated 5 years ago
Alternatives and similar repositories for Open-Source-Security-List-
Users that are interested in Open-Source-Security-List- are comparing it to the libraries listed below
Sorting:
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- ☆54Updated 4 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 7 months ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- ☆76Updated 7 years ago
- Simulating Adversary Operations☆93Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 3 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Updated 6 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 5 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago
- Learnings from OSCP and other random stuff.☆31Updated last year
- Deploy MISP Project software with Vagrant.☆43Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆43Updated 2 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆109Updated 7 months ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Updated 5 years ago