samiul008ghub / soc_setupLinks
This repo contains scripts to install a SIEM (Elasticsearch, Kibana and Filebeat) , HIDS (Wazuh Manager) and NIDS (Suricata)
☆32Updated 6 months ago
Alternatives and similar repositories for soc_setup
Users that are interested in soc_setup are comparing it to the libraries listed below
Sorting:
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Capture screenshots of onion services on an onion service.☆71Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆45Updated 8 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- A list of awesome penetration testing tools and resources.☆80Updated last year
- ☆35Updated 4 months ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆49Updated last month
- Challenge Python☆19Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆101Updated 4 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Cyber Security Awareness Framework (CSAF)☆100Updated 5 months ago
- Automated tool for domains & Subdomains Gathering☆14Updated last year
- ☆28Updated 11 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆41Updated 2 months ago
- ☆21Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 6 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆86Updated 3 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- ☆30Updated 2 years ago
- Tor onion address lookup☆40Updated this week
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆131Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- New Framework Red Team Operations☆18Updated 4 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆67Updated last year
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆77Updated 2 years ago
- OWASP based Web Application Security Testing Checklist☆78Updated last year