Passive service locator, a python sniffer that identifies servers, clients, names and much more
☆258Feb 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for passer
Users that are interested in passer are comparing it to the libraries listed below
Sorting:
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆299Feb 9, 2026Updated 2 weeks ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Feb 9, 2026Updated 2 weeks ago
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,516Jan 12, 2026Updated last month
- Tools for simulating threats☆200Oct 27, 2023Updated 2 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆49Mar 29, 2023Updated 2 years ago
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated last year
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- Template for building a packet sniffer☆15Mar 25, 2024Updated last year
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- Run zeek with zeekctl in docker☆63Sep 12, 2024Updated last year
- ☆2,388Oct 14, 2023Updated 2 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆26Jul 10, 2024Updated last year
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- An Active Defense and EDR software to empower Blue Teams☆1,316Aug 10, 2023Updated 2 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆94Apr 22, 2020Updated 5 years ago
- ☆227Nov 9, 2023Updated 2 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- The Hunting ELK☆3,913Jun 1, 2024Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,340Feb 19, 2026Updated last week
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Helps with finding and registering categorized domains☆70May 6, 2021Updated 4 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Oct 22, 2020Updated 5 years ago
- A Powershell incident response framework☆1,640Nov 22, 2022Updated 3 years ago
- An analytical framework for network traffic and behavioral analytics☆457Dec 7, 2022Updated 3 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- Configuration files for the SOF-ELK VM☆1,719Jan 21, 2026Updated last month
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆124Nov 19, 2020Updated 5 years ago
- The backend server handling API requests and task management☆55Updated this week
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Jan 22, 2021Updated 5 years ago
- Elasticsearch for Offensive Security☆139Aug 21, 2020Updated 5 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago