sqall01 / LSMSLinks
Linux Security and Monitoring Scripts
☆327Updated 2 months ago
Alternatives and similar repositories for LSMS
Users that are interested in LSMS are comparing it to the libraries listed below
Sorting:
- Linux Security and Hardening Security Guide☆213Updated 2 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆187Updated last year
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆744Updated 3 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 2 years ago
- Pwnspoof repository☆265Updated 2 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆411Updated 6 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆434Updated this week
- A PoC ransomware sample to test out your ransomware response strategy.☆213Updated 3 weeks ago
- An open-source self-hosted purple team management web application.☆294Updated last week
- Nmap Dashboard Mini Project☆621Updated last year
- BlueHound - pinpoint the security issues that actually matter☆754Updated 2 years ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆403Updated last year
- Rapidly Search and Hunt through Linux Forensics Artifacts☆200Updated last year
- CLI tools for forensic investigation of Windows artifacts☆348Updated 4 months ago
- Ransomware simulator written in Golang☆460Updated 3 years ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆145Updated last year
- MITRE Caldera™ for OT Plugins & Capabilities☆230Updated last week
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆229Updated 5 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆335Updated 2 years ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆719Updated 4 months ago
- A centralized and enhanced memory analysis platform☆510Updated 5 months ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- ☆218Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆322Updated 7 months ago
- Incident Response collection and processing scripts with automated reporting scripts☆316Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Updated 9 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆470Updated last year
- Pen Test Report Generation and Assessment Collaboration☆581Updated last week