michoo / pciLinks
Packet communication investigator
☆91Updated 2 years ago
Alternatives and similar repositories for pci
Users that are interested in pci are comparing it to the libraries listed below
Sorting:
- ☆51Updated 6 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- SNIcat☆126Updated 3 years ago
- No-Script Automation Tool☆56Updated 6 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 5 years ago
- A YARA Rule Performance Measurement Tool☆59Updated last year
- Passive Network Audit Framework☆32Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 7 months ago
- Lootbox downloads open directories shared on Twitter.☆35Updated 4 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated last year
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- A powershell script for creating a Windows honeyport.☆89Updated 3 months ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆109Updated 4 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆94Updated 7 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆67Updated 2 years ago
- ☆76Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- Process HTTP Pcaps With YARA☆103Updated 11 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- ☆39Updated 5 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Mass static malware analysis tool☆95Updated 3 years ago