insightlake / Data-Security
Enterprise Data Loss Prevention - Profile, Classify, Protect Enterprise Data
☆21Updated 2 years ago
Related projects: ⓘ
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆111Updated last month
- ☆43Updated last year
- Explore Indicators of Compromise Automatically☆94Updated 4 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 2 years ago
- Quickly generate suricata rules for IOCs☆28Updated 3 years ago
- Suricata rules for the new critical vulnerabilities☆79Updated 3 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆180Updated last week
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆59Updated 5 months ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆156Updated 2 weeks ago
- ☆25Updated this week
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 4 years ago
- ☆96Updated 10 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆74Updated 10 months ago
- alertflex controller☆10Updated 8 months ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆45Updated last year
- Open Source Security Information and event Management☆77Updated 8 years ago
- 威胁检测规则集☆15Updated 5 years ago
- General Open Architecture Security Questionnaire☆30Updated last year
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆103Updated 2 years ago
- Tool to discover external and internal network attack surface☆188Updated 3 months ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 2 years ago
- teler Resource Collections☆36Updated this week
- Tenable Nessus 6 API client in Go☆18Updated 3 years ago
- A repository for OSSEC rules and decoders☆51Updated last year
- How to Zeek Sysmon Logs!☆100Updated 2 years ago
- Machine Learning WAF Based☆92Updated 3 years ago
- ☆38Updated 9 months ago
- Awesome Honeypot Resource Collection. Including 250+ Honeypot tools, and 350+ posts about Honeypot.☆86Updated 4 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆201Updated 2 years ago
- 天御攻防实验室 - 威胁猎杀实战系列☆102Updated 5 years ago