cmu-sei / usersimLinks
An agent that performs user actions on a workstation
☆12Updated 8 years ago
Alternatives and similar repositories for usersim
Users that are interested in usersim are comparing it to the libraries listed below
Sorting:
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- ☆85Updated 12 years ago
- PowerShell No Agent Hunting☆111Updated 7 years ago
- Automated install scripts for Cuckoo sandbox☆38Updated 8 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 10 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 10 months ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 10 years ago
- Kirjuri is a web application for managing cases and physical forensic evidence items.☆107Updated 4 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Some IR notes☆73Updated 9 years ago
- Malware Classifier From Network Captures☆82Updated 9 years ago
- Harbinger Threat Intelligence☆83Updated 10 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Updated 5 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 7 years ago
- The Seeker of IOC☆131Updated 5 years ago
- CRITs IOC Visualization in Maltego☆28Updated 11 years ago
- Malware/IOC ingestion and processing engine☆109Updated 7 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- A Windows Event Processing Utility☆47Updated 7 years ago
- A warehouse for your malware☆136Updated 2 months ago
- Tools for the Computer Incident Response Team☆150Updated 8 years ago
- Mass static malware analysis tool☆94Updated 3 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 4 years ago
- Security Onion Elastic Stack☆46Updated 5 years ago
- ☆50Updated 9 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago
- Rekall is an endpoint security solution.☆38Updated 7 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- Malware Repository Framework☆99Updated 7 years ago