sansinstitute / slingshotLinks
SANS Slingshot Linux Distribution
☆53Updated 4 years ago
Alternatives and similar repositories for slingshot
Users that are interested in slingshot are comparing it to the libraries listed below
Sorting:
- an awesome list of active defense resources☆124Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- Let's obscure some IPv4 addresses☆37Updated 2 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆78Updated last year
- ☆29Updated 4 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆104Updated last month
- Defensive Origins Training Schedule☆38Updated last year
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆71Updated 5 years ago
- ☆72Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- ☆55Updated 4 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- My Jupyter Notebooks☆36Updated 5 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆136Updated 2 years ago
- All my slides for any talks☆23Updated 10 months ago
- Active Directory Purple Team Playbook☆110Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Open Threat Hunting Framework☆118Updated 2 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆41Updated 4 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆61Updated 4 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆135Updated last year
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 5 months ago
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year