target / mmk-ui-apiLinks
UI, API, and Scanner (Rules Engine) services for Merry Maker
☆119Updated 3 weeks ago
Alternatives and similar repositories for mmk-ui-api
Users that are interested in mmk-ui-api are comparing it to the libraries listed below
Sorting:
- ☆120Updated last month
- Files vetted, and approved for public release☆55Updated 2 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- ☆191Updated last month
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆323Updated 8 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- Cisco Orbital - Osquery queries by Talos☆135Updated last year
- Serverless honeytoken 🕵🏻♂️☆81Updated 2 years ago
- ☆77Updated 3 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- A Passive SSH back-end and scanner.☆104Updated 6 months ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆298Updated last year
- A python package for use in generating fake data for SOC and security automation.☆173Updated 9 months ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆84Updated last week
- Osquery Resources☆63Updated 6 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- External monitoring for organization assets☆418Updated last year
- A browser extension and API server for detecting corporate password use on external websites☆94Updated 3 months ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- A standard for reducing log volume without sacrificing analytical capability☆213Updated 10 months ago
- Threat Hunting & Incident Investigation with Osquery☆215Updated 3 years ago
- A list of my personal projects☆177Updated 3 years ago
- Taranis☆65Updated 4 years ago
- ☆101Updated last week
- OCSF Documentation☆147Updated 2 months ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆275Updated last week