jeffvader84 / piHunterLinks
Data Driven Threat Hunting on the RaspberryPi
☆30Updated 3 years ago
Alternatives and similar repositories for piHunter
Users that are interested in piHunter are comparing it to the libraries listed below
Sorting:
- Web application to create indexes for GIAC certification examinations.☆148Updated 2 years ago
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- ☆73Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆256Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated 2 months ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆97Updated 4 years ago
- an awesome list of active defense resources☆127Updated 5 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆75Updated 5 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆92Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆118Updated last year
- ☆55Updated 4 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- A PowerShell incident response script for quick triage☆81Updated 3 years ago
- Tools for simulating threats☆199Updated 2 years ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆45Updated 5 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆145Updated 3 weeks ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Updated last year
- Collection of useful Canary tools☆91Updated last month
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- ☆14Updated 11 months ago
- My Jupyter Notebooks☆36Updated 9 months ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- ☆120Updated last month
- DShield Sensor Log Collection with ELK☆46Updated this week