clayball / nector
A SIEM inspired by HECTOR, built on Django.
☆28Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for nector
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆65Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Snort_rules detection bad actors.☆28Updated 3 months ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- A Report Generation Tool for Security Assessment☆63Updated 5 years ago
- Intelligent threat hunter and phishing servers☆47Updated 5 years ago
- A collection of nmap scripts I've written☆23Updated 8 years ago
- A collection of scripts from around the web to be used with OSCP☆11Updated 7 years ago
- Random collection of exploit code, tools, scripts, etc.☆25Updated 9 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Automated Security Assessment Reporting Tool☆39Updated 6 years ago
- recon-ng Maltego local transform pack☆38Updated 10 years ago
- pentestscripts☆16Updated 5 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Updated 5 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆58Updated 4 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- The goal of this program is to quickly pull and install repos from its list☆39Updated last year
- Sample list of penetration test reports☆17Updated 7 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- This is my path to OSCP☆11Updated 6 years ago
- Weape-Wireless-EAP-Extractor☆26Updated 11 years ago