mttaggart / security-tools
A very opinionated list of security tools
☆126Updated last month
Alternatives and similar repositories for security-tools
Users that are interested in security-tools are comparing it to the libraries listed below
Sorting:
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆137Updated 2 weeks ago
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- Knowledge Management for Offensive Security Professionals Official Repository☆141Updated 2 months ago
- Dredging up secrets from the depths of the file system☆126Updated 6 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆190Updated 10 months ago
- ☆59Updated 4 years ago
- Traps web spiders☆72Updated 4 years ago
- Creation of a laboratory for malware analysis in AWS☆96Updated 2 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆244Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆144Updated last month
- Signature based honeypot detector tool written in Golang☆93Updated last month
- ☆239Updated 3 months ago
- Completely Risky Active-Directory Simulation Hub☆100Updated last year
- Tools for simulating threats☆183Updated last year
- ☆178Updated last year
- God Mode Detection Rules☆134Updated 9 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆243Updated 3 weeks ago
- A tool for mapping cyber crime☆139Updated last month
- List of past and future infosec related events.☆147Updated this week
- Automated security lab provisioning☆74Updated last month
- Awesome Incident Response☆271Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆186Updated 2 months ago
- Knowledge base on cybercriminal concealment techniques☆64Updated last week
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆231Updated last week
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated 2 years ago
- Halberd : Multi-Cloud Attack Tool☆273Updated this week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆385Updated 3 months ago
- /dev/tty☆27Updated last week
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year