target / mmk-ui-apiLinks
UI, API, and Scanner (Rules Engine) services for Merry Maker
☆120Updated last year
Alternatives and similar repositories for mmk-ui-api
Users that are interested in mmk-ui-api are comparing it to the libraries listed below
Sorting:
- ☆119Updated 2 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- A Passive SSH back-end and scanner.☆104Updated 4 months ago
- Files vetted, and approved for public release☆55Updated last year
- Cisco Orbital - Osquery queries by Talos☆135Updated last year
- ☆77Updated 3 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated 11 months ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆295Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆321Updated 6 months ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 2 years ago
- External monitoring for organization assets☆415Updated last year
- ☆187Updated last month
- OCSF Documentation☆144Updated 2 weeks ago
- A standard for reducing log volume without sacrificing analytical capability☆211Updated 8 months ago
- Vendor Security Model Contract☆98Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- Falcon Data Replicator☆35Updated last month
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆271Updated this week
- Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- Documentation on the Cyber Defense Matrix☆25Updated 2 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago