etsy / MIDAS
Mac Intrusion Detection Analysis System
☆834Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for MIDAS
- OS X Auditor is a free Mac OS X computer forensics tool☆3,128Updated 4 years ago
- A forensic evidence collection & analysis toolkit for OS X☆1,876Updated 5 years ago
- Alienvault Labs Projects Random Stuff☆513Updated 2 years ago
- DEPRECATED - MozDef: Mozilla Enterprise Defense Platform☆2,168Updated 3 years ago
- Distributed & real time digital forensics at the speed of the cloud☆1,206Updated 5 years ago
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,677Updated 5 months ago
- Laika BOSS: Object Scanning System☆740Updated last year
- Malicious HTTP traffic explorer☆711Updated last year
- Documentation for the GRR Rapid Reponse framework☆301Updated 2 months ago
- Find interesting and potentially hazardous commits in git projects☆350Updated 6 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Updated 2 years ago
- Incident Response Forensic Framework☆598Updated 5 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆655Updated 5 years ago
- [No longer maintained] Apple OS X tool to audit for, and remediate, security configuration settings.☆776Updated 8 years ago
- Filters that process and transform the output of osxcollector☆78Updated 5 years ago
- Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.☆187Updated 3 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 7 years ago
- Honeypot Intelligence with Splunk☆255Updated 6 years ago
- ☆817Updated 7 years ago
- Malcom - Malware Communications Analyzer☆1,155Updated 6 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆497Updated 2 years ago
- Binary analysis and management framework☆1,539Updated last year
- A simple auditing utility for macOS☆282Updated 3 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆933Updated 3 years ago
- Recon, Subdomain Bruting, Zone Transfers☆228Updated 8 years ago
- Corpus of data automatically shared with Apple by a standard installation of OS X Yosemite.☆694Updated 10 years ago