randorisec / talks
Security conferences talks
☆25Updated 4 years ago
Alternatives and similar repositories for talks:
Users that are interested in talks are comparing it to the libraries listed below
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆29Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆99Updated 4 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆27Updated 6 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Projects for AWS ThreatHunting☆21Updated 3 years ago
- ☆52Updated 6 years ago
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆26Updated last year
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Security Onion Elastic Stack☆46Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Manticore Adversary Emulation Cli☆46Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- ☆33Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆59Updated this week
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- ☆53Updated 5 years ago
- No-Script Automation Tool☆56Updated 6 years ago
- A YARA Rule Performance Measurement Tool☆58Updated 11 months ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago