ivre / obsidian-ivre-pluginLinks
Grabs data from IVRE and brings it into Obsidian notes
☆32Updated this week
Alternatives and similar repositories for obsidian-ivre-plugin
Users that are interested in obsidian-ivre-plugin are comparing it to the libraries listed below
Sorting:
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆17Updated 9 months ago
- Red Team Templates For Obsidian.md☆31Updated 3 years ago
- IOC Lens is an Obsidian plugin for cyber security note taking.☆20Updated 5 months ago
- Offensive Security Vault structure for Obsidian☆18Updated 2 years ago
- Script for grabbing markdown files and Obsidian attachments from one folder and copying them to another.☆27Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- SMBScan is a tool to enumerate file shares on an internal network.☆45Updated 2 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆32Updated last year
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆30Updated last month
- Bloodhound Portable for Windows☆51Updated 2 years ago
- URL fingerprinting made easy☆86Updated last year
- ☆19Updated 6 months ago
- Parse MITRE ATT&CK to markdown for Obsidian☆27Updated last month
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆57Updated 2 weeks ago
- JavaScript for Automation (JXA) macOS agent☆80Updated last month
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 5 months ago
- Script to perform some hashcracking logic automagically☆71Updated last year
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆34Updated last year
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆37Updated this week
- adtool Active Directory administration utility for Unix☆10Updated 11 years ago
- List of sources for cybersecurity news☆37Updated 2 years ago
- Extract CIS benchmarks from PDFs☆12Updated last year
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆35Updated last month
- Detect and remove the presence of canary tokens☆20Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 11 months ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- Kali Linux extra useful packages for CTF and Pentest activities☆11Updated 2 weeks ago