target / mmk-ui-apiLinks
UI, API, and Scanner (Rules Engine) services for Merry Maker
☆121Updated last year
Alternatives and similar repositories for mmk-ui-api
Users that are interested in mmk-ui-api are comparing it to the libraries listed below
Sorting:
- ☆119Updated last year
- Dorothy is a tool to test security monitoring and detection for Okta environments☆186Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated 9 months ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆319Updated 4 months ago
- External monitoring for organization assets☆411Updated last year
- Cisco Orbital - Osquery queries by Talos☆134Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆81Updated this week
- Serverless honeytoken 🕵🏻♂️☆80Updated 2 years ago
- Osquery Resources☆62Updated 6 years ago
- ☆77Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆290Updated last year
- A Passive SSH back-end and scanner.☆103Updated 2 months ago
- OCSF Documentation☆137Updated 2 months ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆110Updated 4 years ago
- Vendor Security Model Contract☆98Updated 3 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 2 weeks ago
- A standard for reducing log volume without sacrificing analytical capability☆209Updated 6 months ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Collection of useful Canary tools☆86Updated 3 weeks ago
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- ☆90Updated 3 weeks ago
- Falcon Data Replicator☆33Updated 4 months ago
- ☆41Updated 3 years ago
- Stakeholder-Specific Vulnerability Categorization☆162Updated this week
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 10 months ago
- Files vetted, and approved for public release☆53Updated last year
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆138Updated 4 years ago