jvehent / AutOssecLinks
Ossec cookbook for Chef, with secure & automated key management
☆21Updated 12 years ago
Alternatives and similar repositories for AutOssec
Users that are interested in AutOssec are comparing it to the libraries listed below
Sorting:
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Python based client for IBM XForce Exchange☆25Updated 9 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- ☆36Updated 4 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Updated 10 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 9 years ago
- Bash script for checking HTTP headers for security☆17Updated 11 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- This is a framework written in EnScript to utilize the network capabilities of EnCase. The purpose is to allow for someone to build a qui…☆13Updated 10 years ago
- IRMA ansible☆24Updated 8 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Updated last year
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- ☆48Updated 12 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Updated 7 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 9 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Updated 10 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- Collection of information security policies.☆29Updated 8 years ago
- Malware Analysis Zoo☆25Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago