gf13579 / splunk_easm_worker
☆11Updated last year
Alternatives and similar repositories for splunk_easm_worker:
Users that are interested in splunk_easm_worker are comparing it to the libraries listed below
- ☆10Updated 6 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆39Updated 3 weeks ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 4 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 5 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated last year
- Slides of my public talks☆55Updated last year
- ☆32Updated 4 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆18Updated 6 months ago
- Can you pay the ransom in your country?☆14Updated last year
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- ☆12Updated 3 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated 3 weeks ago
- ☆19Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- DShield Sensor Log Collection with ELK☆24Updated this week
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated 11 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆121Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated last month
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- ☆46Updated 3 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 6 months ago
- ☆34Updated last year
- ☆55Updated last year
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 5 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated this week