target / mmk-ui-apiLinks
UI, API, and Scanner (Rules Engine) services for Merry Maker
☆122Updated 11 months ago
Alternatives and similar repositories for mmk-ui-api
Users that are interested in mmk-ui-api are comparing it to the libraries listed below
Sorting:
- ☆119Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 3 years ago
- ☆77Updated 2 years ago
- Search a filesystem for indicators of compromise (IoC).☆74Updated 2 weeks ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Updated 7 months ago
- ☆100Updated 4 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 8 months ago
- Files vetted, and approved for public release☆53Updated last year
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆79Updated this week
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- Serverless honeytoken 🕵🏻♂️☆79Updated 2 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Collection of useful Canary tools☆81Updated 3 weeks ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆183Updated 10 months ago
- Resources for SANS CTI Summit 2021 presentation☆103Updated last year
- The SOCless automation framework☆140Updated 4 months ago
- A browser extension and API server for detecting corporate password use on external websites☆94Updated 6 months ago
- OWASP Foundation Web Respository☆24Updated 4 months ago
- Vendor Security Model Contract☆98Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆315Updated 2 months ago
- IOCs published by Black Lotus Labs☆121Updated last month
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 5 years ago
- ☆54Updated 4 years ago
- A list of my personal projects☆177Updated 2 years ago
- Swagger/ OpenAPI specifications for security products and services☆78Updated this week
- log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)☆36Updated 3 years ago