alexfrancow / iSOCLinks
 Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.
☆19Updated 2 years ago
Alternatives and similar repositories for iSOC
Users that are interested in iSOC are comparing it to the libraries listed below
Sorting:
- ☆33Updated 9 months ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Repository resource threat intelligence for SOC☆10Updated 7 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 3 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆49Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆63Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- A SIEM inspired by HECTOR, built on Django.☆29Updated 6 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆38Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆65Updated 6 years ago
- NSE script which leverages the Censys Search API for passive data collection☆57Updated 3 years ago
- Snort_rules detection bad actors.☆28Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 7 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 5 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 2 years ago
- OSINT tool to evaluate the trustworthiness of a company☆43Updated 5 years ago