lacework / lacework-labsLinks
☆19Updated 2 years ago
Alternatives and similar repositories for lacework-labs
Users that are interested in lacework-labs are comparing it to the libraries listed below
Sorting:
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- ☆42Updated 2 months ago
- Resources and Discussions About Detection Engineering☆12Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- ☆12Updated 3 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- ☆15Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- ☆19Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- ☆22Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- python3 script that pulls gitlab data of interest using a gitlab personal access token☆13Updated 3 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Updated last week
- A Canary which fires when uninstalled☆34Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- ☆12Updated 4 years ago