hackern0v1c3 / MacMonLinks
Monitors the network for new connected MAC addresses
☆17Updated 2 years ago
Alternatives and similar repositories for MacMon
Users that are interested in MacMon are comparing it to the libraries listed below
Sorting:
- ☆33Updated 3 years ago
- ☆54Updated 4 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆67Updated 4 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 9 months ago
- A Docker container for remote penetration testing.☆135Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Updated 9 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- A set of tools and procedures for automating NSM and NIDS deployments in AWS☆16Updated 4 years ago
- ☆119Updated last year
- Collection of useful Canary tools☆82Updated 3 weeks ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆138Updated 4 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- An ELK environment containing interesting security datasets.☆137Updated 5 years ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- ☆42Updated 4 years ago
- ☆33Updated 7 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆70Updated 5 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Run zeek with zeekctl in docker☆52Updated 10 months ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆63Updated 2 years ago
- Tools to automate and/or expedite response.☆115Updated last year
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆52Updated 5 years ago
- Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack☆27Updated 5 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago