S4kur4 / AutoDeployCuckooLinks
Automatically deploy a Cuckoo sandbox
☆23Updated 2 years ago
Alternatives and similar repositories for AutoDeployCuckoo
Users that are interested in AutoDeployCuckoo are comparing it to the libraries listed below
Sorting:
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- ☆160Updated last year
- Shodan Monitoring integration for TheHive.☆131Updated 7 months ago
- Really can protect from ransomware encryption?☆46Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated last year
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆19Updated 9 months ago
- ☆34Updated 2 years ago
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Updated 3 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆153Updated 2 years ago
- ☆119Updated 2 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆138Updated last year
- ☆67Updated 4 years ago
- ☆13Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- ☆21Updated 2 years ago
- ☆80Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- ☆64Updated 4 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 3 months ago
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- Cyber Security Awareness Framework (CSAF)☆98Updated 4 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 5 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆91Updated last month
- ☆32Updated last year
- ☆40Updated 2 years ago