mindmap created for tools can be used during analysis/investigation
☆28Jan 4, 2017Updated 9 years ago
Alternatives and similar repositories for Tools-mindmap
Users that are interested in Tools-mindmap are comparing it to the libraries listed below
Sorting:
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- ☆23Jun 1, 2022Updated 3 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- ☆13Aug 2, 2020Updated 5 years ago
- PERCEIVE is a project incubator inspired by Apache Incubator and Stack Exchange's Area 51. It serves as a staging zone repository for the…☆13May 21, 2018Updated 7 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are comp…☆17Jul 26, 2024Updated last year
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- Various DFIR Tools☆27Jul 23, 2018Updated 7 years ago
- SecurityTube Hack of the Day☆17Apr 2, 2013Updated 12 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Install mostly used pentesting and CTF tools in Ubuntu 18.04 without adding any extra repository, preventing any crashes in repositories.☆15Apr 29, 2020Updated 5 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆22Apr 15, 2016Updated 9 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- ☆18Apr 26, 2021Updated 4 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Data files for use with hubble☆16Apr 21, 2020Updated 5 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- WEFTools☆14Apr 30, 2020Updated 5 years ago
- Detect HTTP stalling attacks like slowloris with Bro☆19Mar 1, 2018Updated 8 years ago
- ☆10Jan 22, 2025Updated last year
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- Create Users in Active Directory This script creates 270 + users in Active Directory.☆19Oct 20, 2020Updated 5 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Aug 14, 2015Updated 10 years ago
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 7 years ago