rapid7 / attackerkb
Repo for creating-and-tracking issues related to AttackerKB
☆11Updated 2 months ago
Related projects: ⓘ
- vyos based isolation of networks☆11Updated 3 years ago
- a port made of honey for blocking people☆11Updated 4 years ago
- OSINT tool to evaluate the trustworthiness of a company☆39Updated 4 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 7 months ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated last year
- CLI tools using Harpoon features☆21Updated 10 months ago
- ☆20Updated last year
- Useful commands for infosec☆28Updated last year
- ☆24Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 2 years ago
- THOR APT Scanner User Manual☆14Updated 2 weeks ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- ☆25Updated this week
- Build Automated Machine Images for MISP☆28Updated last year
- Indicator of Compromise Scanner for CVE-2019-19781☆92Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 2 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 4 years ago
- ☆15Updated 6 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆9Updated 6 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆56Updated 2 years ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Updated 4 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆17Updated 4 years ago
- ☆11Updated 7 years ago
- ☆20Updated this week
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 8 months ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆14Updated last week
- Hashes of infamous malware☆24Updated last year