sqall01 / LSMSLinks
Linux Security and Monitoring Scripts
☆324Updated 10 months ago
Alternatives and similar repositories for LSMS
Users that are interested in LSMS are comparing it to the libraries listed below
Sorting:
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 3 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆210Updated 3 months ago
- Linux Security and Hardening Security Guide☆211Updated last year
- Analyze pcaps with Zeek and a Grafana Dashboard☆181Updated last year
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆737Updated 4 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- Pwnspoof repository☆264Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆328Updated this week
- Rapidly Search and Hunt through Linux Forensics Artifacts☆194Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆400Updated 2 months ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆140Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆468Updated 11 months ago
- A centralized and enhanced memory analysis platform☆481Updated 3 weeks ago
- CLI tools for forensic investigation of Windows artifacts☆344Updated 2 weeks ago
- An open-source self-hosted purple team management web application.☆278Updated last week
- ☆218Updated last year
- Map tracking ransomware, by OCD World Watch team☆469Updated 5 months ago
- BlueHound - pinpoint the security issues that actually matter☆742Updated 2 years ago
- Live Feed of C2 servers, tools, and botnets☆689Updated this week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆703Updated last month
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆258Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆318Updated 3 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆295Updated 2 years ago
- Ransomware simulator written in Golang☆442Updated 3 years ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆398Updated last year
- A tool to recover from ESXiArgs ransomware☆299Updated 2 years ago
- An offensive data enrichment pipeline☆802Updated this week
- Nmap Dashboard Mini Project☆610Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆647Updated last year
- MITRE Caldera™ for OT Plugins & Capabilities☆217Updated this week