hslatman / awesome-securityLinks
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
☆24Updated 8 years ago
Alternatives and similar repositories for awesome-security
Users that are interested in awesome-security are comparing it to the libraries listed below
Sorting:
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆14Updated 9 years ago
- A curated list of tools for incident response☆19Updated 5 years ago
- Cyber Intel Management☆49Updated 7 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆63Updated 9 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆68Updated 10 years ago
- Maltego transforms for the ThreatCrowd search API☆49Updated 7 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆52Updated 9 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Updated last year
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆66Updated 7 years ago
- Python script to pull various IOCs from PDFs☆15Updated 10 years ago
- MantaRay Automated Computer Forensic Triage Tool☆63Updated 6 years ago
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Fix acquired .evt - Windows Event Log files (Forensics)☆19Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 5 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 10 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 11 months ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆82Updated 9 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago