hslatman / awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
☆25Updated 8 years ago
Alternatives and similar repositories for awesome-security:
Users that are interested in awesome-security are comparing it to the libraries listed below
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Updated 8 years ago
- A curated list of tools for incident response☆19Updated 5 years ago
- A curated list of awesome social engineering resources.☆16Updated 7 years ago
- ☆30Updated 6 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆18Updated 8 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆68Updated 10 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆22Updated 6 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆13Updated 7 years ago
- open-source intelligence gathering for SIEMs <3☆38Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- A simple Nessus results viewer☆49Updated 11 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Netwitness Maltego integration Project☆18Updated 7 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- Simple tool to find the yara matches on a file☆1Updated 6 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Fix acquired .evt - Windows Event Log files (Forensics)☆19Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Updated 7 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 9 years ago