target / mmk-ui-apiLinks
UI, API, and Scanner (Rules Engine) services for Merry Maker
☆119Updated 2 weeks ago
Alternatives and similar repositories for mmk-ui-api
Users that are interested in mmk-ui-api are comparing it to the libraries listed below
Sorting:
- ☆121Updated last week
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 4 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated last year
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆330Updated 10 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 4 years ago
- ☆77Updated 3 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆301Updated 2 years ago
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- A Passive SSH back-end and scanner.☆104Updated 7 months ago
- ☆192Updated this week
- Osquery Resources☆63Updated 6 years ago
- External monitoring for organization assets☆417Updated last year
- Files vetted, and approved for public release☆55Updated 2 years ago
- Hashes for vulnerable LOG4J versions☆156Updated 4 years ago
- ☆100Updated 5 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆277Updated last week
- Serverless honeytoken 🕵🏻♂️☆81Updated 3 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Updated 2 years ago
- Vendor Security Model Contract☆97Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- Python library to carry out DFIR analysis on the Cloud☆497Updated 4 months ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆139Updated 4 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆152Updated 2 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 5 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated 2 years ago
- OCSF Documentation☆152Updated last week
- A python package for use in generating fake data for SOC and security automation.☆175Updated 11 months ago
- ☆41Updated 4 years ago
- Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack☆27Updated 6 years ago