gf13579 / splunk_easm_workerLinks
☆11Updated last year
Alternatives and similar repositories for splunk_easm_worker
Users that are interested in splunk_easm_worker are comparing it to the libraries listed below
Sorting:
- ☆10Updated 10 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆19Updated 9 months ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆46Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 11 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆46Updated last year
- Anvilogic Forge☆104Updated last week
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆52Updated last week
- Wazuh integration TheHive☆38Updated 2 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last year
- ☆34Updated 8 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆165Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 3 weeks ago
- Shodan Monitoring integration for TheHive.☆131Updated 7 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 8 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- AWS, Azure, Alibaba and Google bucket scanner☆154Updated last year
- ☆34Updated 2 years ago
- ☆119Updated last year
- ☆22Updated last month
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆64Updated last year
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆87Updated 6 months ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- SIEM Cheat Sheet☆74Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 7 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 2 months ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆29Updated 5 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆97Updated 8 months ago
- An index of publicly available and open-source threat detection rulesets.☆118Updated 2 months ago