alexfrancow / iSOC
Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.
☆19Updated 2 years ago
Alternatives and similar repositories for iSOC:
Users that are interested in iSOC are comparing it to the libraries listed below
- ☆34Updated 3 weeks ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 3 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 5 years ago
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆4Updated 2 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- ☆21Updated last year
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 9 months ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Security checks for your researches☆33Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- ☆14Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Blue Team Powershell Script☆18Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A static website template for security pages.☆50Updated 5 months ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Virtual Security Operations Center☆50Updated last year
- ☆15Updated 3 years ago