guardicore / labs_campaigns
☆354Updated 3 years ago
Alternatives and similar repositories for labs_campaigns
Users that are interested in labs_campaigns are comparing it to the libraries listed below
Sorting:
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆540Updated 2 weeks ago
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Updated 3 years ago
- osquery extensions by Trail of Bits☆264Updated 2 years ago
- ☆261Updated 6 years ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 4 years ago
- Powershell-based Windows Security Auditing Toolbox☆577Updated 6 years ago
- Remote forensics meta tool☆465Updated last month
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆602Updated 11 months ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆174Updated 6 years ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- A modular OSINT honeypot for blue teamers☆333Updated 2 years ago
- A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.☆907Updated 5 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- Investigate suspicious activity by visualizing Sysmon's event log☆421Updated last year
- Elasticsearch for Offensive Security☆141Updated 4 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- Logging Made Easy☆712Updated last year
- psad: Intrusion Detection and Log Analysis with iptables☆400Updated last year
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 6 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆244Updated 3 years ago
- AI-based, context-driven network device ranking☆297Updated last year
- Open source Active Directory security audit framework.☆134Updated 7 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Endpoint detection & Malware analysis software☆230Updated 5 years ago
- GeoLogonalyzer is a utility to analyze remote access logs for anomalies such as travel feasibility and data center sources.☆195Updated 9 months ago
- Blue Team Scripts☆248Updated 5 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆115Updated 5 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆153Updated last year