guardicore / labs_campaignsLinks
☆355Updated 3 years ago
Alternatives and similar repositories for labs_campaigns
Users that are interested in labs_campaigns are comparing it to the libraries listed below
Sorting:
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆541Updated 3 months ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- AI-based, context-driven network device ranking☆299Updated last year
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 4 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- Logging Made Easy☆711Updated last year
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆673Updated last year
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 6 years ago
- Cowrie Docker GitHub repository☆81Updated 3 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆111Updated last year
- Pulled Pork for Snort and Suricata rule management (from Google code)☆438Updated 4 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆290Updated last year
- Old CIS benchmarks archive☆163Updated 4 years ago
- Sguil client for NSM☆219Updated last year
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆263Updated 2 years ago
- Cross-platform Yara scanner written in Go☆329Updated 2 years ago
- A script that automates generation of OpenSSL reverse shells☆302Updated 4 years ago
- ☆101Updated 4 years ago
- DejaVU - Open Source Deception Framework☆414Updated 3 weeks ago
- psad: Intrusion Detection and Log Analysis with iptables☆405Updated 2 years ago
- Remote forensics meta tool☆470Updated 5 months ago
- Guidance for mitigation web shells. #nsacyber☆985Updated 2 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 2 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆213Updated 3 years ago
- zBang is a risk assessment tool that detects potential privileged account threats☆340Updated 3 years ago
- Blue Team Scripts☆250Updated 6 years ago
- Swordphish Phishing Awareness Tool☆224Updated 11 months ago