redteam-project / compliantLinks
Ansible role for security standards compliance
☆13Updated 6 years ago
Alternatives and similar repositories for compliant
Users that are interested in compliant are comparing it to the libraries listed below
Sorting:
- Containerized pentesting tools☆45Updated 3 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Updated 5 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Notebook collection☆10Updated 6 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- A rogue DNS detector☆23Updated last year
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated this week
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- Fake SMB and SAMR data☆11Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 6 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 4 years ago
- Repository resource threat intelligence for SOC☆10Updated 6 years ago