gf13579 / splunk_easm_workerLinks
☆12Updated last year
Alternatives and similar repositories for splunk_easm_worker
Users that are interested in splunk_easm_worker are comparing it to the libraries listed below
Sorting:
- ☆10Updated last year
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆51Updated last week
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- Shodan Monitoring integration for TheHive.☆130Updated last year
- Anvilogic Forge☆114Updated 4 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago
- ☆25Updated 7 months ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆183Updated 4 months ago
- GUI tool which enables you to parse nessus scan files from Tenable Nessus and Tenable Security Center, and exports results to a spreadshe…☆110Updated 2 weeks ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆167Updated 2 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆52Updated last week
- Open Threat Hunting Framework☆123Updated 2 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Updated 3 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Updated last month
- Signature based honeypot detector tool written in Golang☆108Updated 10 months ago
- Tool to discover external and internal network attack surface☆203Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆128Updated 10 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Updated 2 weeks ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆145Updated 3 years ago
- AWS, Azure, Alibaba and Google bucket scanner☆174Updated 2 years ago
- ☆34Updated 2 years ago
- ☆50Updated last week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago
- ☆169Updated 4 months ago
- Collection of useful Canary tools☆93Updated last week