runZeroInc / runzero-tools
Open source tools, libraries, and datasets related to the runZero product and associated research
☆119Updated 3 weeks ago
Alternatives and similar repositories for runzero-tools:
Users that are interested in runzero-tools are comparing it to the libraries listed below
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆108Updated last year
- Simulating Adversary Operations☆93Updated 7 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Test a host for susceptibility to CVE-2019-19781☆108Updated 4 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 5 years ago
- Escaping Restricted Environments and Bypassing DLP☆73Updated 6 years ago
- Automatically exported from code.google.com/p/nipper-ng☆71Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 2 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated last year
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Updated 8 years ago
- Passive Security Tools Fingerprinting Framework☆73Updated 4 years ago
- ☆59Updated 4 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- ☆53Updated 6 years ago
- How to Zeek Sysmon Logs!☆101Updated 3 years ago
- An Insider Threat Toolkit☆151Updated 6 years ago
- Internet data acquisition☆149Updated 4 years ago
- GreyNoise Query Language☆82Updated 5 years ago
- ☆139Updated 5 years ago
- ☆98Updated 4 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago