Security-Onion-Solutions / securityonion-elsa-extras
☆10Updated 7 years ago
Alternatives and similar repositories for securityonion-elsa-extras:
Users that are interested in securityonion-elsa-extras are comparing it to the libraries listed below
- ☆11Updated 4 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆17Updated 11 years ago
- Host files with DNS☆32Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- ☆36Updated 4 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- ☆24Updated 5 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Simple install script for Snort/Bro IDS with JSON logging on FreeBSD☆18Updated 8 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- SystemInspector is a script to pull a majority of the security-relevant files and settings from a system.☆18Updated 6 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- recon framework in ruby☆13Updated 13 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Updated 5 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 10 years ago
- A curated list of tools for incident response☆29Updated last year
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- PowerShell Utilities for Security Situational Awareness☆12Updated 8 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- ☆22Updated 5 years ago