Te-k / commands-for-sec
Useful commands for infosec
☆29Updated 2 years ago
Alternatives and similar repositories for commands-for-sec:
Users that are interested in commands-for-sec are comparing it to the libraries listed below
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- ☆24Updated 2 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- ☆14Updated 6 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆28Updated 8 years ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- repo for sharing stuff☆16Updated last year
- Python bindings for Yeti's API☆18Updated last year
- A CLI tool for querying passive DNS services☆41Updated last year
- ☆12Updated 5 years ago
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆9Updated 2 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 6 months ago
- ☆22Updated 4 years ago
- ☆24Updated last year
- HoneyDB Python Module☆13Updated last year
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated 11 months ago
- ☆17Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago