sqall01 / LSMSLinks
Linux Security and Monitoring Scripts
☆327Updated 3 months ago
Alternatives and similar repositories for LSMS
Users that are interested in LSMS are comparing it to the libraries listed below
Sorting:
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆188Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 2 years ago
- Linux Security and Hardening Security Guide☆214Updated 2 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆212Updated last month
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆743Updated 4 months ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆145Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆412Updated 7 months ago
- Pwnspoof repository☆264Updated 2 years ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Updated last year
- CLI tools for forensic investigation of Windows artifacts☆348Updated 5 months ago
- ☆219Updated last year
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆403Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- An open-source self-hosted purple team management web application.☆295Updated 2 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆483Updated 2 weeks ago
- Nmap Dashboard Mini Project☆621Updated last year
- Map tracking ransomware, by OCD World Watch team☆481Updated 9 months ago
- A tool to recover from ESXiArgs ransomware☆300Updated 2 years ago
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆257Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆322Updated 8 months ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆229Updated 5 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- MITRE Caldera™ for OT Plugins & Capabilities☆231Updated last week
- Incident Response collection and processing scripts with automated reporting scripts☆319Updated last year
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆191Updated 8 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆270Updated 6 months ago
- Ransomware simulator written in Golang☆463Updated 3 years ago