randorisec / talksLinks
Security conferences talks
☆25Updated 5 years ago
Alternatives and similar repositories for talks
Users that are interested in talks are comparing it to the libraries listed below
Sorting:
- Compilation of resources to help with Adversary Simulation automation harness☆100Updated 4 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- THOR MITRE ATT&CK Framework Coverage☆24Updated 5 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- ☆30Updated 6 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Virtual Security Operations Center☆51Updated last year
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 6 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆48Updated 3 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆78Updated 2 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆86Updated 2 years ago
- Deploy MISP Project software with Vagrant.☆43Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Projects for AWS ThreatHunting☆21Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- No-Script Automation Tool☆56Updated 6 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago