clayball / nector
A SIEM inspired by HECTOR, built on Django.
☆29Updated 6 years ago
Alternatives and similar repositories for nector:
Users that are interested in nector are comparing it to the libraries listed below
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Snort_rules detection bad actors.☆28Updated 8 months ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- This is my path to OSCP☆11Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- A collection of scripts from around the web to be used with OSCP☆11Updated 8 years ago
- OSCP Scripts☆14Updated 9 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- A collection of nmap scripts I've written☆23Updated 9 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- ☆44Updated 7 years ago
- Random collection of exploit code, tools, scripts, etc.☆27Updated 10 years ago
- A scripted library of hacking techniques.☆18Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated 2 months ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- Python bindings for Yeti's API☆18Updated last year
- ☆25Updated 3 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆33Updated 3 years ago
- Experimental PowerShell tools for Penetration Testing / Red Teaming☆22Updated 7 years ago