RoseSecurity / Obfusc8tedLinks
You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to the Human Resources representative, they did not notice any anomalous activity while browsing the web, but the AppleLabs' system information and event management (SIEM) instance alerted on a suspicious domain. Mo…
☆76Updated 3 years ago
Alternatives and similar repositories for Obfusc8ted
Users that are interested in Obfusc8ted are comparing it to the libraries listed below
Sorting:
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- an awesome list of active defense resources☆126Updated 5 years ago
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- This repository is for the vagrant instances of VulnHub machines☆47Updated last year
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆92Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆106Updated last month
- ☆15Updated 6 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆75Updated 5 years ago
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆96Updated 4 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- Defence Against the Dark Arts☆34Updated 6 years ago
- SANS Slingshot Linux Distribution☆55Updated 5 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 4 years ago
- My Jupyter Notebooks☆36Updated 8 months ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- ☆67Updated 2 months ago
- ☆29Updated 5 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Updated 5 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- A list of resources to build a information security team.☆13Updated 4 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆151Updated 4 years ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Pwnspoof repository☆265Updated 2 years ago