guardicore / labs_campaignsLinks
☆354Updated 3 years ago
Alternatives and similar repositories for labs_campaigns
Users that are interested in labs_campaigns are comparing it to the libraries listed below
Sorting:
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆542Updated 3 months ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- ☆101Updated 4 years ago
- AI-based, context-driven network device ranking☆299Updated last year
- ☆561Updated 2 years ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- Files vetted, and approved for public release☆53Updated last year
- Old CIS benchmarks archive☆163Updated 4 years ago
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 6 years ago
- Sguil client for NSM☆219Updated last year
- CommunityHoneyNetwork Server☆40Updated 2 years ago
- SunBurst DGA Decode Script☆207Updated 4 years ago
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- DShield Raspberry Pi Sensor☆483Updated this week
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 4 years ago
- Logging Made Easy☆712Updated last year
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆202Updated 2 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Updated 3 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆154Updated last year
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 5 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆437Updated 4 years ago
- A network packet forensics tool for SSH☆253Updated 4 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 5 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆288Updated last year
- Guidance for mitigation web shells. #nsacyber☆984Updated 2 years ago
- DejaVU - Open Source Deception Framework☆413Updated last week
- Investigate suspicious activity by visualizing Sysmon's event log☆422Updated last year