RiverGumSecurity / RegExLinks
☆21Updated 4 years ago
Alternatives and similar repositories for RegEx
Users that are interested in RegEx are comparing it to the libraries listed below
Sorting:
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆48Updated 2 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆22Updated 5 years ago
- Ransomware Simulator for Red/Blue teams to test their defences.☆19Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- Hackers Don't Give A Shit☆16Updated 6 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated 2 years ago
- Files to automatically deploy red team Active Directory test lab☆48Updated 3 years ago
- ☆15Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 4 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated 2 months ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 5 years ago
- ☆50Updated last week
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 4 years ago
- Windows Security Logging☆43Updated 3 years ago
- ☆80Updated 2 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Updated last year
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Updated 3 years ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- Source code and examples for Antignis☆44Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 3 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆40Updated this week