target / mmk-ui-apiLinks
UI, API, and Scanner (Rules Engine) services for Merry Maker
☆119Updated last year
Alternatives and similar repositories for mmk-ui-api
Users that are interested in mmk-ui-api are comparing it to the libraries listed below
Sorting:
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated last year
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆322Updated 7 months ago
- ☆120Updated 3 weeks ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆296Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- Cisco Orbital - Osquery queries by Talos☆135Updated last year
- Osquery Resources☆63Updated 6 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆274Updated last week
- External monitoring for organization assets☆417Updated last year
- A Passive SSH back-end and scanner.☆104Updated 5 months ago
- ☆77Updated 3 years ago
- ☆189Updated last week
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆266Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆211Updated 3 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated 2 years ago
- Files vetted, and approved for public release☆55Updated last year
- A browser extension and API server for detecting corporate password use on external websites☆94Updated 2 months ago
- Python library to carry out DFIR analysis on the Cloud☆489Updated last month
- Vendor Security Model Contract☆98Updated 3 years ago
- A standard for reducing log volume without sacrificing analytical capability☆212Updated 9 months ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆207Updated 7 months ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 2 years ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Updated 5 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Implementing the CIS Critical Controls (almost) for Free☆87Updated 3 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 5 years ago
- ☆41Updated 3 years ago