jvehent / AutOssecLinks
Ossec cookbook for Chef, with secure & automated key management
☆21Updated 11 years ago
Alternatives and similar repositories for AutOssec
Users that are interested in AutOssec are comparing it to the libraries listed below
Sorting:
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 9 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 9 years ago
- PowerShell Utilities for Security Situational Awareness☆12Updated 8 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 9 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Python based client for IBM XForce Exchange☆25Updated 8 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- ☆32Updated 11 years ago
- Getting Started with ELK☆50Updated 9 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 7 months ago
- This chef cookbook provides security configuration for mysql.☆27Updated 2 months ago
- Ansible Provisioned Security Testing Platform☆17Updated 8 years ago
- A List of InfoSec Resources☆10Updated 10 years ago
- Ruby Oracle Security Scanner☆16Updated 12 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Install and configure user mode auditd tools☆34Updated 2 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- Custom slash command to do a basic nmap scan from within Slack☆25Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- ☆11Updated 7 years ago