sneakymonk3y / foxhound-nsmLinks
Foxhound: Blackbox - A Raspberry Pi NSM
☆37Updated 7 years ago
Alternatives and similar repositories for foxhound-nsm
Users that are interested in foxhound-nsm are comparing it to the libraries listed below
Sorting:
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 9 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 9 months ago
- Repo for autosnort scripts.☆156Updated 5 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 3 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆105Updated 7 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Queries to parse sysmon event log file with microsoft logparser☆58Updated 10 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆144Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 7 years ago
- ☆142Updated last year
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆80Updated 8 years ago
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Transparent network tap☆122Updated 10 years ago
- PhishReporter Outlook Add-In in an Outlook Add-In that allows users to report phishing e-mails to a specific e-mail address for further p…☆35Updated 8 years ago
- Harbinger Threat Intelligence☆83Updated 10 years ago
- Windows PowerShell domain scanning tool☆54Updated 9 years ago
- My network monitoring solution and tools that go along with it.☆61Updated 3 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Modern Honey Network App for Splunk☆50Updated 6 years ago
- Automatic firewall rule orchestator.☆82Updated 8 years ago
- Rogue AP killer☆91Updated 7 years ago
- ☆61Updated 7 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago