vhawk19 / automated-threat-intelligent-modelLinks
An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering python scripts when integrated with McAfee Advanced Threat Defense and Malware Informaton Sharing Platform can defend against new and futuristic cyber attacks.
☆10Updated 6 years ago
Alternatives and similar repositories for automated-threat-intelligent-model
Users that are interested in automated-threat-intelligent-model are comparing it to the libraries listed below
Sorting:
- This contains common OSCP local exploits and enumeration scripts☆11Updated 10 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- ☆14Updated 5 years ago
- ☆33Updated 9 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Cobalt Strike/C2 Servers☆13Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆67Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 5 years ago
- ☆19Updated 4 years ago
- Manticore Adversary Emulation Cli☆48Updated 5 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆34Updated last year
- OSINT tool to evaluate the trustworthiness of a company☆43Updated 5 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- ☆15Updated 3 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- ☆10Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago