karimhabush / cyberowl
A daily updated summary of the most frequent types of security advisories currently being reported from different sources.
☆248Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for cyberowl
- Tool to discover external and internal network attack surface☆192Updated 5 months ago
- ☆170Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆150Updated 2 years ago
- Pwnspoof repository☆257Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆252Updated last month
- This is a collection of threat detection rules / rules engines that I have come across.☆274Updated 6 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆257Updated 9 months ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆632Updated 3 weeks ago
- BlueHound - pinpoint the security issues that actually matter☆712Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆210Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆240Updated 6 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆449Updated 4 months ago
- Data visualization for blue teams☆124Updated last year
- A collection of intelligence about Log4Shell and its exploitation activity.☆181Updated 2 years ago
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆358Updated last month
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆280Updated last year
- POSIX script for mail security checks of domain names☆75Updated last year
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆143Updated last year
- External monitoring for organization assets☆372Updated 5 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆161Updated last month
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆138Updated 3 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆137Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆101Updated 2 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆308Updated 3 weeks ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆244Updated this week
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆218Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)☆128Updated 6 months ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆251Updated this week
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆165Updated 4 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆231Updated 11 months ago