clayball / nector
A SIEM inspired by HECTOR, built on Django.
☆29Updated 5 years ago
Alternatives and similar repositories for nector:
Users that are interested in nector are comparing it to the libraries listed below
- Snort_rules detection bad actors.☆28Updated 7 months ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- intrusion detection☆23Updated 7 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- Random collection of exploit code, tools, scripts, etc.☆27Updated 9 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 4 months ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- Automated Memory Forensic☆35Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- ☆18Updated last year