alexfrancow / iSOCLinks
Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.
☆19Updated 2 years ago
Alternatives and similar repositories for iSOC
Users that are interested in iSOC are comparing it to the libraries listed below
Sorting:
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- ☆33Updated 5 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Updated 3 years ago
- Security checks for your researches☆33Updated 4 years ago
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆4Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Custom security distro for remote penetration testing☆53Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- ☆21Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- recon-ng modules for Censys☆37Updated last year
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- ☆14Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- Create visualization from Shodan query☆74Updated 4 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago