password123456 / linux-security-auditLinks
Linux Security Audit Tool
☆27Updated 7 months ago
Alternatives and similar repositories for linux-security-audit
Users that are interested in linux-security-audit are comparing it to the libraries listed below
Sorting:
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆268Updated 5 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆411Updated 6 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆186Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- Semi-automated security hardening for Linux / Debian / Ubuntu , 2025, attempts DISA STIG and CIS Compliance☆102Updated this week
- ☆64Updated 4 years ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆475Updated this week
- This post offers a technical comparison of dark web monitoring providers, focusing on Webz.io, CyberSixGill, and DarkOwl. It highlights W…☆20Updated last year
- A very opinionated list of security tools☆128Updated 8 months ago
- COMPLETE OSINT CHEAT-SHEET☆112Updated last month
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆146Updated last week
- List of resources for buiding a home lab☆289Updated 2 years ago
- Open Source SIEM Stack☆136Updated last week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last month
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆199Updated 3 weeks ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆145Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆182Updated last week
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago
- Honeypot Service Simulator☆23Updated last year
- A curated list of Awesome Threat Intelligence Blogs☆471Updated 2 weeks ago
- Traps web spiders☆76Updated 5 years ago
- Docker container for the gophish phishing framework.☆52Updated 2 months ago
- Tools to automatically create a SANS index based off the course pdf files.☆116Updated 5 years ago
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆386Updated last month
- A cli script to analyze an E-Mail in the EML format for viewing the header, extracting attachments, etc.☆111Updated 2 years ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆409Updated 2 months ago
- /dev/tty☆27Updated this week
- Automated security lab provisioning☆85Updated last month
- ☆40Updated 2 years ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 10 months ago