mttaggart / security-toolsLinks
A very opinionated list of security tools
☆126Updated 2 months ago
Alternatives and similar repositories for security-tools
Users that are interested in security-tools are comparing it to the libraries listed below
Sorting:
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆141Updated this week
- Dredging up secrets from the depths of the file system☆127Updated 7 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- ☆59Updated 4 years ago
- Knowledge Management for Offensive Security Professionals Official Repository☆143Updated 3 months ago
- ☆177Updated last year
- Some important DFIR Resources☆83Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆97Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆144Updated 2 months ago
- Knowledge base on cybercriminal concealment techniques☆68Updated last month
- Completely Risky Active-Directory Simulation Hub☆100Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆244Updated 2 years ago
- God Mode Detection Rules☆134Updated 9 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated 2 years ago
- A collection of methods to learn who the owner of an IP address is.☆158Updated last week
- List of tools and resources for pentesting Microsoft Active Directory☆72Updated last week
- Tools for simulating threats☆185Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆190Updated 11 months ago
- ☆241Updated 4 months ago
- Dictionary of CTI-related acronyms, terms, and jargon☆142Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- List of past and future infosec related events.☆153Updated this week
- Traps web spiders☆74Updated 4 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 10 months ago
- A template for writing a condensed course index leveraging LaTeX indexing