Underground-Ops / underground-nexusLinks
☆28Updated 3 months ago
Alternatives and similar repositories for underground-nexus
Users that are interested in underground-nexus are comparing it to the libraries listed below
Sorting:
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆119Updated last year
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆150Updated 2 months ago
- Controls Assessment Specification☆70Updated 10 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆173Updated this week
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆246Updated this week
- A set of guidelines and best practices for an awesome engineering team☆265Updated last month
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆83Updated last month
- CISA's catalog of bad practices that are exceptionally risky.☆210Updated 2 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated last week
- WA Cyber Security Unit (DGOV Technical) site☆44Updated last week
- Cyber Incident Response Team Playbook Battle Cards☆426Updated last year
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 3 years ago
- Tools for simulating threats☆199Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆114Updated 3 years ago
- DDTTX Tabletop Trainings☆28Updated 4 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆77Updated 5 years ago
- the UNOFFICIAL (but useful) Python library for the Rapid7 InsightVM/Nexpose RESTful API☆78Updated last year
- A collection of assets I created to help improve security and governance operations for Azure environments☆10Updated 4 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆49Updated 2 months ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆54Updated 4 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆292Updated 4 years ago
- Run zeek with zeekctl in docker☆62Updated last year
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆251Updated 3 weeks ago
- Ansible Playbook to install the ELK Stack☆44Updated 5 years ago
- Docker image for Velocidex Velociraptor☆145Updated last month
- NIST CyberSecurity Framework management tool☆166Updated 4 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Updated last week
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago