target / mmk-ui-api
UI, API, and Scanner (Rules Engine) services for Merry Maker
☆123Updated 6 months ago
Alternatives and similar repositories for mmk-ui-api:
Users that are interested in mmk-ui-api are comparing it to the libraries listed below
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆299Updated 3 months ago
- ☆117Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Updated 2 months ago
- Search a filesystem for indicators of compromise (IoC).☆69Updated this week
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated last year
- External monitoring for organization assets☆387Updated 8 months ago
- A standard for reducing log volume without sacrificing analytical capability☆199Updated last year
- A python package for use in generating fake data for SOC and security automation.☆167Updated 3 weeks ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆178Updated 6 months ago
- Cisco Orbital - Osquery queries by Talos☆130Updated 5 months ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆255Updated this week
- A Passive SSH back-end and scanner.☆103Updated 8 months ago
- A tool designed to hunt for Phishing Kit source code☆217Updated last year
- A collection of intelligence about Log4Shell and its exploitation activity.☆183Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 3 months ago
- High signal information security sources Goggle.☆67Updated last year
- Hashes for vulnerable LOG4J versions☆153Updated 3 years ago
- Collection of useful Canary tools☆75Updated this week
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆127Updated last year
- A python script developed to process Windows memory images based on triage type.☆260Updated last year
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆143Updated last year
- OCSF Documentation☆122Updated last month
- A browser extension and API server for detecting corporate password use on external websites☆91Updated 2 months ago
- Threat Hunting & Incident Investigation with Osquery☆204Updated 2 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆291Updated 4 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆51Updated 2 years ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year