blazeinfosec / FlameLinks
Flame - Send vulnerabilities reports to SIEM
☆15Updated 8 years ago
Alternatives and similar repositories for Flame
Users that are interested in Flame are comparing it to the libraries listed below
Sorting:
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 7 months ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 10 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- ☆15Updated 7 years ago
- Spam trap management☆23Updated 11 months ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆24Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago