target / mmk-ui-apiLinks
UI, API, and Scanner (Rules Engine) services for Merry Maker
☆121Updated last year
Alternatives and similar repositories for mmk-ui-api
Users that are interested in mmk-ui-api are comparing it to the libraries listed below
Sorting:
- ☆119Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated 8 months ago
- External monitoring for organization assets☆409Updated last year
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆318Updated 3 months ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆184Updated 11 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 3 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆157Updated this week
- OCSF Documentation☆135Updated last month
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- A Passive SSH back-end and scanner.☆103Updated last month
- ☆77Updated 2 years ago
- Stakeholder-Specific Vulnerability Categorization☆155Updated this week
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆285Updated last year
- Cisco Orbital - Osquery queries by Talos☆134Updated 10 months ago
- ☆100Updated 4 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆183Updated 3 years ago
- Serverless honeytoken 🕵🏻♂️☆79Updated 2 years ago
- Python library to carry out DFIR analysis on the Cloud☆482Updated 2 months ago
- ☆48Updated 5 months ago
- A standard for reducing log volume without sacrificing analytical capability☆205Updated 4 months ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆207Updated 3 months ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆265Updated last week
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆79Updated this week
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 8 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 10 months ago
- Collection of useful Canary tools☆82Updated 3 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆71Updated last month