jzadeh / aktaion2View external linksLinks
Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based on machine learning techniques, independent of static-based signatures.
☆51Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for aktaion2
Users that are interested in aktaion2 are comparing it to the libraries listed below
Sorting:
- ☆14Sep 3, 2017Updated 8 years ago
- As seen at DEF CON and O'Reilly Live Trainings☆24Jul 30, 2025Updated 6 months ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Sep 26, 2017Updated 8 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 6 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Sep 8, 2021Updated 4 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- V1.0☆15Aug 8, 2016Updated 9 years ago
- ☆25Jan 8, 2024Updated 2 years ago
- ☆21Nov 7, 2023Updated 2 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Updated this week
- ☆50Jan 30, 2026Updated 2 weeks ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆42Sep 18, 2018Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 4 years ago
- A Web Server to hide stuff☆21Apr 29, 2022Updated 3 years ago
- powershell script to simulate activity by a user☆22Jul 29, 2020Updated 5 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- ☆19Jan 27, 2022Updated 4 years ago
- Welcome to the hands-on resource hub for the Generative AI Development Environments Bootcamp. This repo is designed to help you explore d…☆25Oct 22, 2025Updated 3 months ago
- Automated handling of data feeds for security teams☆147Dec 31, 2025Updated last month
- ☆34Apr 5, 2017Updated 8 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53May 31, 2018Updated 7 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- Threat Feed Aggregation, Made Easy☆169Jul 13, 2020Updated 5 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- Provides an overview of the inner file structure of a PDF☆25Sep 26, 2022Updated 3 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago