hackern0v1c3 / MacMon
Monitors the network for new connected MAC addresses
☆17Updated 2 years ago
Alternatives and similar repositories for MacMon:
Users that are interested in MacMon are comparing it to the libraries listed below
- Collection of useful Canary tools☆77Updated last week
- ☆33Updated 2 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 11 months ago
- ☆54Updated 3 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- Documentation on the Cyber Defense Matrix☆24Updated last year
- ☆33Updated 6 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆67Updated 4 years ago
- A Docker container for remote penetration testing.☆135Updated 4 years ago
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆63Updated last year
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆69Updated 4 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- A port of BHIS's Backdoors & Breaches for playingcards.io☆62Updated 2 years ago
- Find accounts using common and default passwords in Active Directory.☆68Updated 5 years ago
- ☆42Updated 4 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 5 months ago
- ☆117Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- Powershell - web traffic whitenoise generator☆47Updated 4 years ago
- automate your MISP installs☆67Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- ☆15Updated 5 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Corelight@Home script☆40Updated last year
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated last year