RiverGumSecurity / RegExLinks
☆21Updated 3 years ago
Alternatives and similar repositories for RegEx
Users that are interested in RegEx are comparing it to the libraries listed below
Sorting:
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- ☆25Updated 2 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- DEFCON 31 slide deck and video link☆61Updated 11 months ago
- ☆47Updated last month
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- create a "simulated internet" cyber range environment☆16Updated this week
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- Stupid Simple Detection Testing☆13Updated last year
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 10 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Baseline a Windows System against LOLBAS☆27Updated last year
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- Project to Support The Hunter's Framework (THF)☆11Updated last year
- A CALDERA plugin☆26Updated 10 months ago
- ☆15Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆26Updated 3 years ago
- ☆33Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 10 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 4 months ago