tenable / audit_files
Nessus Audit files
☆31Updated 2 years ago
Alternatives and similar repositories for audit_files:
Users that are interested in audit_files are comparing it to the libraries listed below
- Kerberoast Detection Script☆30Updated 4 months ago
- ☆41Updated 2 years ago
- ☆41Updated 11 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Automatic detection engineering technical state compliance☆54Updated 8 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- ☆21Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆26Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 8 months ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- Open IOC sharing platform☆56Updated 4 months ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 10 months ago
- Look into EDR events from network☆23Updated 11 months ago
- ShellSweeping the evil.☆52Updated 9 months ago
- Slides and materials for conference presentations☆11Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Updated 3 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆47Updated 3 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago