target / mmk-ui-api
UI, API, and Scanner (Rules Engine) services for Merry Maker
☆122Updated 9 months ago
Alternatives and similar repositories for mmk-ui-api:
Users that are interested in mmk-ui-api are comparing it to the libraries listed below
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated 5 months ago
- Collection of useful Canary tools☆77Updated last week
- Python library to carry out DFIR analysis on the Cloud☆476Updated 2 weeks ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆181Updated 8 months ago
- ☆117Updated last year
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- ☆77Updated 2 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆307Updated last week
- A standard for reducing log volume without sacrificing analytical capability☆203Updated last month
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated last year
- Threat Hunting & Incident Investigation with Osquery☆207Updated 3 years ago
- A python package for use in generating fake data for SOC and security automation.☆168Updated last month
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- External monitoring for organization assets☆395Updated 10 months ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆161Updated last month
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- The SOCless automation framework☆139Updated 2 months ago
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- A list of my personal projects☆176Updated 2 years ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆147Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆276Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆285Updated 11 months ago
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆75Updated 2 weeks ago
- OCSF Documentation☆129Updated 2 months ago
- Cloud Security Operations Orchestrator☆184Updated last year
- Osquery Resources☆60Updated 5 years ago
- log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)☆36Updated 3 years ago
- A browser extension and API server for detecting corporate password use on external websites☆93Updated 4 months ago