RiverGumSecurity / RegEx
☆21Updated 3 years ago
Alternatives and similar repositories for RegEx:
Users that are interested in RegEx are comparing it to the libraries listed below
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- ☆15Updated 3 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- ☆47Updated 3 weeks ago
- create a "simulated internet" cyber range environment☆16Updated last week
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 10 months ago
- ☆24Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 4 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Ransomware Simulator for Red/Blue teams to test their defences.☆19Updated 3 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 2 weeks ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 months ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Threat Mitigation Strategies☆25Updated last year
- ☆11Updated 4 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 11 months ago
- Project to Support The Hunter's Framework (THF)☆11Updated last year
- Baseline a Windows System against LOLBAS☆26Updated last year
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated last month
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- ☆28Updated 4 months ago