target / mmk-ui-api
UI, API, and Scanner (Rules Engine) services for Merry Maker
☆123Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for mmk-ui-api
- ☆114Updated last year
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆292Updated this week
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 2 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆265Updated 10 months ago
- ☆77Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆69Updated 2 weeks ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆251Updated last month
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆89Updated last year
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆152Updated last year
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Cisco Orbital - Osquery queries by Talos☆122Updated 2 months ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆256Updated this week
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆258Updated last year
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆285Updated last month
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆141Updated 11 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆77Updated 9 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆208Updated 2 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆271Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆181Updated 2 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆144Updated this week
- OSSEM Common Data Model☆54Updated 2 years ago
- A browser extension and API server for detecting corporate password use on external websites☆92Updated last week
- A CVE Heatmap Using CalPlot☆98Updated 3 years ago
- Sample programs to access the API☆60Updated this week
- Search a filesystem for indicators of compromise (IoC).☆68Updated 2 months ago
- ☆207Updated last year
- OCSF Documentation☆119Updated 2 weeks ago
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆72Updated last month