grimm-co / mme
Man-in-the-middle made easy!
☆15Updated 5 years ago
Alternatives and similar repositories for mme
Users that are interested in mme are comparing it to the libraries listed below
Sorting:
- ☆19Updated last year
- Presentation Slides and Resources☆16Updated 11 months ago
- C# User Simulation☆32Updated 2 years ago
- Exploit, Malware and Vulnerability Scoring Application☆13Updated last year
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- Parses Java Cache IDX files☆39Updated 7 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Some rules, scripts of some use to us☆9Updated 6 months ago
- ☆22Updated 4 years ago
- ☆11Updated 6 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Updated 4 years ago
- CybatiWorks-1 ICS/SCADA/IoT/IT Cybersecurity Education Platform☆9Updated 10 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Dont Gamble with Risk☆14Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Old home of LimaCharlie, open source EDR☆30Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Updated 6 years ago
- Adversary Emulation Planner☆39Updated 10 months ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- Microsoft Flow Attack Framework☆23Updated 5 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 5 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago