mttaggart / security-tools
A very opinionated list of security tools
☆126Updated last month
Alternatives and similar repositories for security-tools:
Users that are interested in security-tools are comparing it to the libraries listed below
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆137Updated 3 weeks ago
- ☆173Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 11 months ago
- List of past and future infosec related events.☆144Updated this week
- Automated security lab provisioning☆73Updated last month
- Creation of a laboratory for malware analysis in AWS☆95Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆145Updated last month
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- ☆58Updated 3 years ago
- Dredging up secrets from the depths of the file system☆125Updated 5 months ago
- God Mode Detection Rules☆134Updated 8 months ago
- Tools for simulating threats☆183Updated last year
- Some important DFIR Resources☆83Updated 2 years ago
- A tool for mapping cyber crime☆132Updated last week
- Knowledge Management for Offensive Security Professionals Official Repository☆138Updated last month
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆235Updated last month
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆244Updated 2 years ago
- MISP Playbooks☆197Updated 2 months ago
- ☆239Updated 3 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆184Updated 2 months ago
- ☆132Updated last year
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- /dev/tty☆27Updated 2 weeks ago
- An open-source self-hosted purple team management web application.☆268Updated 3 weeks ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- Pwnspoof repository☆261Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆125Updated last year
- CLI tools for forensic investigation of Windows artifacts☆327Updated 5 months ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆34Updated last year
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆101Updated 8 months ago