da667 / Autosnort3Links
Make your swine run like it's Divine
☆10Updated 3 months ago
Alternatives and similar repositories for Autosnort3
Users that are interested in Autosnort3 are comparing it to the libraries listed below
Sorting:
- ☆69Updated 3 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Site for IWS book content☆18Updated 6 years ago
- CSIRT Jump Bag☆26Updated last year
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- ☆38Updated 3 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Hunt malware with Volatility☆47Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 4 months ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- XOR Key Extractor☆50Updated 10 months ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 10 months ago
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- All my slides for any talks☆23Updated 8 months ago
- HoneyPot Orchestration☆11Updated last year
- ☆76Updated 7 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated last month
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- ☆20Updated 5 years ago
- Recon Hunt Queries☆77Updated 4 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- This repository is for the vagrant instances of VulnHub machines☆46Updated 9 months ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago