infosecn1nja / awesome-threat-detectionLinks
A curated list of awesome threat detection and hunting resources
☆19Updated 6 years ago
Alternatives and similar repositories for awesome-threat-detection
Users that are interested in awesome-threat-detection are comparing it to the libraries listed below
Sorting:
- A curated list of Awesome Threat Intelligence resources☆17Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Updated 6 years ago
- Small and highly portable detection tests.☆13Updated 7 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 7 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆14Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆13Updated 8 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆66Updated 4 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆100Updated last year
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆38Updated last year
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆54Updated 4 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆49Updated 3 weeks ago
- A collection of awesome penetration testing resources, tools and other shiny things☆18Updated 8 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 3 years ago
- Distrubición Linux para Osint☆56Updated 6 years ago
- A curated list of awesome social engineering resources.☆16Updated 8 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆12Updated 2 months ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆11Updated 5 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago