da667 / Autosnort3Links
Make your swine run like it's Divine
☆11Updated 2 months ago
Alternatives and similar repositories for Autosnort3
Users that are interested in Autosnort3 are comparing it to the libraries listed below
Sorting:
- ☆69Updated 3 years ago
- CSIRT Jump Bag☆26Updated last year
- ☄️ go-out - A Golang egress buster.☆127Updated last year
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 3 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- ☆38Updated 3 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Updated 3 months ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Updated 2 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆41Updated 4 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Defensomania is a security monitoring and incident response card game.☆62Updated 2 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 9 months ago
- ☆76Updated 7 years ago
- Import AbuseCH IOC Feeds into MISP☆12Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- ☆20Updated 4 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆217Updated 3 years ago
- ☆79Updated 5 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 4 months ago