sqall01 / LSMSLinks
Linux Security and Monitoring Scripts
☆327Updated 2 weeks ago
Alternatives and similar repositories for LSMS
Users that are interested in LSMS are comparing it to the libraries listed below
Sorting:
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 2 years ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆185Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆212Updated 5 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆404Updated 4 months ago
- Pwnspoof repository☆264Updated 2 years ago
- Linux Security and Hardening Security Guide☆211Updated 2 years ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆402Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆391Updated 2 weeks ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆741Updated last month
- Advanced Bash script designed for conducting digital forensics on Linux systems☆144Updated last year
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆257Updated last year
- An open-source self-hosted purple team management web application.☆290Updated last month
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆712Updated 2 months ago
- Live Feed of C2 servers, tools, and botnets☆704Updated this week
- Redeye is a tool intended to help you manage your data during a pentest operation☆469Updated last year
- Nmap Dashboard Mini Project☆618Updated last year
- BlueHound - pinpoint the security issues that actually matter☆749Updated 2 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆320Updated 5 months ago
- CLI tools for forensic investigation of Windows artifacts☆347Updated 2 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆200Updated last year
- Map tracking ransomware, by OCD World Watch team☆473Updated 7 months ago
- A centralized and enhanced memory analysis platform☆496Updated 2 months ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆813Updated 7 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆663Updated last year
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆481Updated 5 months ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆276Updated last year
- Pentesting automation platform that combines hacking tools to complete assessments☆513Updated this week
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆326Updated 2 years ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆166Updated 2 years ago