morphuslabs / distinct
Find potential Indicators of Compromise among similar Linux servers
☆29Updated 7 years ago
Alternatives and similar repositories for distinct:
Users that are interested in distinct are comparing it to the libraries listed below
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 7 years ago
- ☆29Updated 6 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 7 years ago
- Modular tool to test exfiltration techniques.☆36Updated 7 years ago
- A bunch of scripts I use to work with urlscan.io☆33Updated 5 years ago
- 504 VSAgent☆23Updated 6 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 3 months ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Updated 8 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated 11 months ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Randori: Like Aiki. With a couple of Dans under its belt.☆14Updated 7 years ago
- ☆25Updated 8 years ago
- Windows PowerShell domain scanning tool☆54Updated 8 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆17Updated 10 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 7 months ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Rapid Assessment of Web Resources☆18Updated 8 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 3 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- Security Onion Elastic Stack☆46Updated 3 years ago
- A ton of helpful tools☆39Updated 3 years ago
- first commit☆20Updated last year
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago