sqall01 / LSMSLinks
Linux Security and Monitoring Scripts
☆324Updated 8 months ago
Alternatives and similar repositories for LSMS
Users that are interested in LSMS are comparing it to the libraries listed below
Sorting:
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆310Updated 2 weeks ago
- Ransomware simulator written in Golang☆439Updated 2 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆316Updated last month
- Rapidly Search and Hunt through Linux Forensics Artifacts☆193Updated last year
- An open-source self-hosted purple team management web application.☆274Updated last month
- A centralized and enhanced memory analysis platform☆464Updated last month
- An offensive data enrichment pipeline☆744Updated this week
- firedrill is a malware simulation harness for evaluating your security controls☆185Updated last year
- Linux Security and Hardening Security Guide☆211Updated last year
- Red Team Attack Lab for TTP testing & research☆574Updated 2 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆214Updated 7 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 2 years ago
- Practical Windows Forensics Training☆668Updated last year
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆617Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆252Updated last year
- Pwnspoof repository☆262Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆802Updated 4 months ago
- Map tracking ransomware, by OCD World Watch team☆468Updated 3 months ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆142Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆637Updated last year
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆398Updated last year
- BlueHound - pinpoint the security issues that actually matter☆738Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,033Updated 7 months ago
- CLI tools for forensic investigation of Windows artifacts☆342Updated 7 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆670Updated 3 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆698Updated last week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆257Updated 2 weeks ago
- Documentation and scripts to properly enable Windows event logs.☆618Updated last year