target / mmk-ui-api
UI, API, and Scanner (Rules Engine) services for Merry Maker
☆122Updated 8 months ago
Alternatives and similar repositories for mmk-ui-api:
Users that are interested in mmk-ui-api are comparing it to the libraries listed below
- ☆117Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆179Updated 7 months ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆147Updated last year
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆74Updated 6 months ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- A Passive SSH back-end and scanner.☆102Updated 3 weeks ago
- Cisco Orbital - Osquery queries by Talos☆130Updated 7 months ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆303Updated 4 months ago
- A list of my personal projects☆176Updated 2 years ago
- Zeek Log Cheatsheets☆289Updated 2 years ago
- A standard for reducing log volume without sacrificing analytical capability☆202Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆185Updated last week
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆80Updated last year
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆272Updated last year
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated last year
- The CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cybe…☆47Updated 4 years ago
- Search a filesystem for indicators of compromise (IoC).☆70Updated last month
- The latest pyWars client for the SEC573 class☆44Updated 2 weeks ago
- Anvilogic Forge☆95Updated 2 weeks ago
- Osquery Resources☆60Updated 5 years ago
- Automatically create YARA rules from malicious documents.☆210Updated 2 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- A python package for use in generating fake data for SOC and security automation.☆168Updated 2 weeks ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago