aquasecurity / traceeshark
Deep Linux runtime visibility meets Wireshark
☆182Updated last week
Related projects: ⓘ
- Threat-hunting tool for Linux☆356Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆145Updated last week
- Automation tool for Windows Deception Host Burn-In☆71Updated 2 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆160Updated 3 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆79Updated 6 months ago
- 💀 Don't fear the Reaper 👻☆250Updated 2 weeks ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆209Updated 2 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆48Updated 2 weeks ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆160Updated 3 weeks ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆248Updated 11 months ago
- Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment.☆164Updated 2 weeks ago
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆337Updated last month
- Add a layer of active defense to your cloud applications.☆77Updated this week
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆150Updated 2 years ago
- ☆68Updated this week
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆572Updated 3 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆159Updated last month
- God Mode Detection Rules☆130Updated last month
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆159Updated 5 months ago
- Canary Detection☆159Updated 5 months ago
- ☆234Updated 4 months ago
- Pen Test Report Generation and Assessment Collaboration☆413Updated 3 weeks ago
- Gram is Klarna's own threat model diagramming tool☆267Updated last week
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆91Updated 2 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆119Updated 4 months ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆168Updated 2 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆136Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆270Updated 4 months ago
- ☆291Updated last month
- Simple ethernet interface traffic monitor and reporting tool☆72Updated last month