ZoccoCss / kalisocLinks
Cloudformation Template to Launch the SOC from Kali Purple
☆53Updated last year
Alternatives and similar repositories for kalisoc
Users that are interested in kalisoc are comparing it to the libraries listed below
Sorting:
- ☆22Updated 2 years ago
- A runbook for handling security incidents in cooperation with 0xsyr0☆52Updated 3 years ago
- ☆34Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆103Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- https://lolad-project.github.io/☆82Updated 10 months ago
- A fast and comprehensive tool for organizational network scanning☆135Updated last year
- ☆31Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- ☆79Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- Some of my rough notes for Docker threat detection☆48Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆77Updated last month
- ☆65Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Updated last year
- ☆94Updated 3 years ago
- ☆120Updated 3 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- MayorSec DNS Enumeration Tool☆89Updated 11 months ago
- ☆55Updated 9 months ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆68Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆123Updated 3 years ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆53Updated last month
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year