target / mmk-ui-apiLinks
UI, API, and Scanner (Rules Engine) services for Merry Maker
☆120Updated last year
Alternatives and similar repositories for mmk-ui-api
Users that are interested in mmk-ui-api are comparing it to the libraries listed below
Sorting:
- ☆119Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated 10 months ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆319Updated 5 months ago
- External monitoring for organization assets☆412Updated last year
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆291Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- Files vetted, and approved for public release☆53Updated last year
- A Passive SSH back-end and scanner.☆104Updated 3 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- ☆187Updated this week
- ☆77Updated 2 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- Serverless honeytoken 🕵🏻♂️☆80Updated 2 years ago
- OCSF Documentation☆139Updated 3 months ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆82Updated 2 weeks ago
- ☆49Updated last month
- Python library to carry out DFIR analysis on the Cloud☆487Updated last month
- Cisco Orbital - Osquery queries by Talos☆134Updated last year
- Osquery Resources☆62Updated 6 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆138Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆84Updated last year
- Documentation on the Cyber Defense Matrix☆25Updated 2 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆269Updated this week
- ☆101Updated 4 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated last year
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆207Updated 5 months ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated last month
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- A standard for reducing log volume without sacrificing analytical capability☆209Updated 7 months ago