A tool to assess data quality, built on top of the awesome OSSEM.
☆80Jul 29, 2022Updated 3 years ago
Alternatives and similar repositories for ossem-power-up
Users that are interested in ossem-power-up are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open Source Security Events Metadata (OSSEM)☆1,290Feb 27, 2023Updated 3 years ago
- Exfiltrate data with ICMP☆102Jan 31, 2018Updated 8 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Dec 20, 2019Updated 6 years ago
- Re-play Security Events☆1,729Mar 20, 2024Updated 2 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆356Nov 3, 2020Updated 5 years ago
- Elemental - An ATT&CK Threat Library☆319Dec 8, 2022Updated 3 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- Detect Tactics, Techniques & Combat Threats☆2,270Jan 21, 2026Updated 2 months ago
- Searches For Threat Hunting and Security Analytics☆238Mar 26, 2025Updated last year
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated last month
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 8 years ago
- ☆25May 9, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 6 months ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- Collection of created MindMaps☆150Nov 14, 2023Updated 2 years ago
- OSINT tool to evaluate the trustworthiness of a company☆41Dec 7, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- This is a python version of samesame repo to generate homograph strings☆24Aug 22, 2018Updated 7 years ago
- DFIRTrack - The Incident Response Tracking Application☆534Jan 13, 2026Updated 2 months ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆241Aug 1, 2021Updated 4 years ago
- Windows Events Attack Samples☆2,531Jan 24, 2023Updated 3 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆568Dec 19, 2025Updated 3 months ago
- Repository for my ATT&CK analysis research.☆70May 16, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A modular framework designed to chain and automate security tests.☆44Jan 6, 2021Updated 5 years ago
- ☆14Aug 27, 2025Updated 7 months ago
- INTERCEPT / Policy as Code Auditing☆85Jan 4, 2026Updated 2 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆140Jun 26, 2019Updated 6 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆95Feb 2, 2022Updated 4 years ago