runZeroInc / runzero-tools
Open source tools, libraries, and datasets related to the runZero product and associated research
☆113Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for runzero-tools
- ☆53Updated 5 years ago
- How to Zeek Sysmon Logs!☆101Updated 2 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆103Updated last year
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 3 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 2 years ago
- Simulating Adversary Operations☆93Updated 6 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 4 years ago
- A Go implementation of JARM☆119Updated 2 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆90Updated 6 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆63Updated 4 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆92Updated 4 years ago
- ☆82Updated 3 years ago
- A CLI tool for querying passive DNS services☆41Updated 11 months ago
- Automated Tactics Techniques & Procedures☆251Updated last year
- Threat Alert Logic Repository☆89Updated 5 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆117Updated 5 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 2 years ago
- Linux Incident Response☆89Updated 5 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆107Updated 6 months ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆54Updated 4 months ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆91Updated 7 years ago
- Open source Active Directory security audit framework.☆133Updated 6 years ago
- Elasticsearch for Offensive Security☆138Updated 4 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆68Updated 3 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆124Updated 6 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆168Updated last year