magoo / osquery-hids
Launchd daemon that reports major OSX modifications through growl
☆16Updated 10 years ago
Alternatives and similar repositories for osquery-hids:
Users that are interested in osquery-hids are comparing it to the libraries listed below
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Websocket based egress tester☆20Updated 8 years ago
- ☆24Updated 5 years ago
- first commit☆20Updated last year
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- IRMA ansible☆24Updated 8 years ago
- PowerShell Utilities for Security Situational Awareness☆12Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated 11 months ago
- Mass DNS resolution tool☆36Updated 4 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 11 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Artefacts from various retefe campaigns☆10Updated 5 years ago
- ☆28Updated 7 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago