guardicore / labs_campaignsLinks
☆355Updated 3 years ago
Alternatives and similar repositories for labs_campaigns
Users that are interested in labs_campaigns are comparing it to the libraries listed below
Sorting:
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆541Updated 4 months ago
- ☆101Updated 4 years ago
- AI-based, context-driven network device ranking☆300Updated last year
- Code + documentation for the public GreyNoise API☆314Updated 4 years ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆272Updated 4 years ago
- Old CIS benchmarks archive☆162Updated 4 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- DShield Raspberry Pi Sensor☆488Updated last month
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆111Updated last year
- Snort FAQ☆118Updated 4 years ago
- SunBurst DGA Decode Script☆207Updated 4 years ago
- Files vetted, and approved for public release☆53Updated last year
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆291Updated last year
- DejaVU - Open Source Deception Framework☆415Updated last month
- Sguil client for NSM☆219Updated last year
- Guidance for mitigation web shells. #nsacyber☆981Updated 2 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 3 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆674Updated last year
- Logging Made Easy☆711Updated last year
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year
- Remote forensics meta tool☆471Updated 6 months ago
- CommunityHoneyNetwork Server☆41Updated 2 years ago
- Super Next generation Advanced Reactive honEypot☆468Updated last year
- Lets Map Your Network enables you to visualise your physical network in form of graph with zero manual error☆454Updated 3 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- A testing framework for mail security and filtering solutions.☆245Updated 2 years ago
- a network packet capture compiler☆202Updated 3 years ago