set-element / auditdBroFramework
The Auditd Framework logs and applies security policy to linux auditd data
☆15Updated 7 years ago
Alternatives and similar repositories for auditdBroFramework:
Users that are interested in auditdBroFramework are comparing it to the libraries listed below
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- collection of python scripts to capture dns traffic and store it in elasticsearch☆8Updated 3 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- API Tools☆27Updated 9 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 7 months ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆21Updated 9 years ago
- Extract information from MISP via the API☆15Updated 8 years ago
- ☆24Updated 5 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- yara rules for crypto detection☆30Updated 11 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago