randorisec / talksLinks
Security conferences talks
☆25Updated 5 years ago
Alternatives and similar repositories for talks
Users that are interested in talks are comparing it to the libraries listed below
Sorting:
- Compilation of resources to help with Adversary Simulation automation harness☆100Updated 5 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 5 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆79Updated 3 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 7 years ago
- ☆51Updated 3 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 7 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 2 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Mindmaps for threat hunting - work in progress.☆152Updated 3 years ago
- AWS EKS Cluster Forensics☆23Updated 4 years ago
- No-Script Automation Tool☆56Updated 7 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- Tools for AWS forensics☆65Updated 9 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Updated 2 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆112Updated 4 years ago
- ☆30Updated 7 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆92Updated 2 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆89Updated 2 years ago
- Simulating Adversary Operations☆96Updated 7 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated 2 years ago
- Materials for AWS Training☆15Updated 4 years ago