infosecn1nja / awesome-threat-detection
A curated list of awesome threat detection and hunting resources
☆18Updated 5 years ago
Alternatives and similar repositories for awesome-threat-detection:
Users that are interested in awesome-threat-detection are comparing it to the libraries listed below
- A curated list of Awesome Threat Intelligence resources☆16Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 5 years ago
- Small and highly portable detection tests.☆13Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆15Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 6 years ago
- ☆34Updated last month
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆13Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- ☆14Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆11Updated 6 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated last year
- A collection of open source and commercial tools that aid in red team operations.☆10Updated 5 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆45Updated 3 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Nmap Web Dashboard and Reporting☆34Updated 2 years ago
- A tool to abuse Exchange services☆18Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Sp00fer blog post -☆26Updated 2 years ago