jusafing / pnafLinks
Passive Network Audit Framework
☆32Updated 7 years ago
Alternatives and similar repositories for pnaf
Users that are interested in pnaf are comparing it to the libraries listed below
Sorting:
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Normalizer for honeypot data.☆46Updated 10 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Passive DNS V2☆60Updated 11 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- ☆52Updated 7 years ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated last year
- Parses Java Cache IDX files☆40Updated 7 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Netwitness Maltego integration Project☆18Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 8 years ago
- HoneySAP: SAP Low-interaction research honeypot☆51Updated 2 years ago