Te-k / commands-for-sec
Useful commands for infosec
☆29Updated 2 years ago
Alternatives and similar repositories for commands-for-sec
Users that are interested in commands-for-sec are comparing it to the libraries listed below
Sorting:
- ☆14Updated 6 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- ☆24Updated 2 years ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Python bindings for Yeti's API☆18Updated last year
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- CyCAT.org taxonomies☆15Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- ☆22Updated 4 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- repo for sharing stuff☆16Updated last year
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆9Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Small scripts and POCs related to digital forensics☆17Updated 2 years ago
- ☆28Updated 4 months ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- ☆24Updated last year