sqall01 / LSMS
Linux Security and Monitoring Scripts
☆321Updated 5 months ago
Alternatives and similar repositories for LSMS:
Users that are interested in LSMS are comparing it to the libraries listed below
- Analyze pcaps with Zeek and a Grafana Dashboard☆173Updated 10 months ago
- ☆235Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆268Updated last week
- A PoC ransomware sample to test out your ransomware response strategy.☆207Updated 3 months ago
- An open-source self-hosted purple team management web application.☆264Updated last week
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆315Updated 5 months ago
- BlueHound - pinpoint the security issues that actually matter☆730Updated last year
- An offensive data enrichment pipeline☆668Updated last month
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆350Updated 2 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆653Updated 2 months ago
- CLI tools for forensic investigation of Windows artifacts☆328Updated 4 months ago
- Map tracking ransomware, by OCD World Watch team☆460Updated 3 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆553Updated 3 weeks ago
- A centralized and enhanced memory analysis platform☆434Updated last month
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆141Updated 2 years ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆188Updated last year
- Pwnspoof repository☆258Updated last year
- MITRE Caldera™ for OT Plugins & Capabilities☆207Updated 4 months ago
- ☆701Updated last month
- Linux Security and Hardening Security Guide☆211Updated last year
- Advanced Bash script designed for conducting digital forensics on Linux systems☆141Updated 11 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated 9 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆157Updated 2 years ago
- Ransomware simulator written in Golang☆428Updated 2 years ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆717Updated 10 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆200Updated last week
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,025Updated 4 months ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆611Updated 9 months ago
- Open-source vulnerability scanner☆418Updated 4 months ago
- Live Feed of C2 servers, tools, and botnets☆607Updated this week