Network Defender Toolkit
☆18Jun 11, 2013Updated 12 years ago
Alternatives and similar repositories for ndf
Users that are interested in ndf are comparing it to the libraries listed below
Sorting:
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Server Shield is a lightweight method of protecting and hardening your Linux server. It is easy to install, hard to mess up, and makes yo…☆173Jan 31, 2013Updated 13 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- A streamlined way to create STIX documents!☆31Apr 30, 2014Updated 11 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Jul 11, 2022Updated 3 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- ☆24Aug 25, 2015Updated 10 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23May 4, 2016Updated 9 years ago
- Extract useful information from a Twitter account.☆35Jan 1, 2014Updated 12 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- Remote kernel exploit for ROSE amateur radio☆24Aug 8, 2011Updated 14 years ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- A hardened baseline configuration for the Nginx web server.☆24Jan 21, 2016Updated 10 years ago
- ☆26Nov 9, 2021Updated 4 years ago
- Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection☆36Mar 14, 2018Updated 7 years ago
- Automatic attack detector and botnet classifier☆28Jan 10, 2017Updated 9 years ago
- Log analysis and SQL storage for Bind DNS server☆36May 17, 2016Updated 9 years ago
- python wrapper to use tshark for file extraction from the command line.☆26Nov 15, 2018Updated 7 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Jun 23, 2018Updated 7 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- A collection of useful radare2 scripts!☆32Feb 2, 2018Updated 8 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 7 years ago
- Ghidra RE scripts☆38Feb 5, 2021Updated 5 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year