lacework / lacework-labs
☆19Updated 2 years ago
Alternatives and similar repositories for lacework-labs:
Users that are interested in lacework-labs are comparing it to the libraries listed below
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Open YARA scan- and search engine☆20Updated 3 weeks ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 6 years ago
- ☆42Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- ☆15Updated 3 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Kibana app for RedELK☆16Updated last year
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 5 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆27Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- A rogue DNS detector☆23Updated last year
- Analytics for Accounting logs from Network devices☆16Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- various slides and presentations I've worked on☆18Updated 10 months ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- ☆22Updated 4 years ago