alexfrancow / iSOC
Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.
☆19Updated 2 years ago
Alternatives and similar repositories for iSOC:
Users that are interested in iSOC are comparing it to the libraries listed below
- ☆33Updated 2 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- ☆21Updated 2 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- a collection of bash script and python to automate ZAP Security Tests☆11Updated 4 years ago
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆4Updated 2 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Security checks for your researches☆33Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- ☆11Updated 8 years ago
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 11 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- ☆42Updated last week
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- Yet another OSINT automator.☆19Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- ☆14Updated last year
- HoneyDB Python Module☆13Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago