alexfrancow / iSOC
Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.
☆19Updated 2 years ago
Alternatives and similar repositories for iSOC:
Users that are interested in iSOC are comparing it to the libraries listed below
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- ☆33Updated 3 months ago
- ☆21Updated 2 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 11 months ago
- ☆42Updated last month
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- HoneyDB Python Module☆13Updated last year
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆4Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- ☆14Updated last year
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Security checks for your researches☆33Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Updated 3 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- Kibana app for RedELK☆17Updated 2 years ago
- A static website template for security pages.☆50Updated 8 months ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago