kf0jvt / deez_factorsLinks
Looks for GitHub org users without 2FA turned on
☆9Updated 8 years ago
Alternatives and similar repositories for deez_factors
Users that are interested in deez_factors are comparing it to the libraries listed below
Sorting:
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- Python bindings for Yeti's API☆18Updated last year
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Various blog post projects.☆10Updated 11 months ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- AYY LMAO☆22Updated 9 years ago
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 2 months ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- splunk alert script to create resilient tickets☆10Updated 8 years ago
- Forensic Dropbox☆21Updated 12 years ago
- first commit☆20Updated last year
- Python-based cloud node for local use☆11Updated 7 years ago
- Extract information from MISP via the API☆15Updated 8 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21Updated 3 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 4 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Updated 7 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆13Updated 7 years ago
- ☆11Updated 7 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 7 months ago