runZeroInc / runzero-tools
Open source tools, libraries, and datasets related to the runZero product and associated research
☆116Updated 3 weeks ago
Alternatives and similar repositories for runzero-tools:
Users that are interested in runzero-tools are comparing it to the libraries listed below
- Recog-Go: Pattern Recognition using Rapid7 Recog☆106Updated last year
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Simulating Adversary Operations☆92Updated 6 years ago
- Burp Suite extension to perform Kerberos authentication☆104Updated 7 months ago
- ☆53Updated 5 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 3 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 2 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- Automated Tactics Techniques & Procedures☆252Updated last year
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- The User Interface for GoCrack☆86Updated last week
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middlew…☆32Updated 4 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Updated 7 months ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆120Updated 5 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆312Updated 4 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 4 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- ☆98Updated 6 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆169Updated this week
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Smart Install Client Scanner☆61Updated 5 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 5 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆108Updated 9 months ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago