shellsharks / assortedLinks
☆13Updated 6 months ago
Alternatives and similar repositories for assorted
Users that are interested in assorted are comparing it to the libraries listed below
Sorting:
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- Triaging Windows event logs based on SANS Poster☆40Updated last week
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Updated 5 years ago
- ☆80Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- ☆44Updated 2 months ago
- URL fingerprinting made easy☆89Updated last year
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 11 months ago
- Windows Security Logging☆43Updated 3 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 weeks ago
- An experiment to address digital intelligence archiving on offensive engagements.☆25Updated 4 years ago
- Useful commands for infosec☆29Updated 2 years ago
- ☆29Updated 8 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 10 months ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Scripts and One-Liners☆22Updated 7 months ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 4 months ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Updated 2 years ago
- List of sources for cybersecurity news☆39Updated 2 years ago
- ☆16Updated 4 years ago