lacework / lacework-labsLinks
☆19Updated 2 years ago
Alternatives and similar repositories for lacework-labs
Users that are interested in lacework-labs are comparing it to the libraries listed below
Sorting:
- Manticore's Public Threats Repository☆10Updated 4 years ago
- ☆42Updated 2 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 2 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Scan blob files for sensitive content☆11Updated 3 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- ☆12Updated 3 years ago
- ☆15Updated 3 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Static configuration extractor for the Karton framework☆10Updated 4 months ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago