vhawk19 / automated-threat-intelligent-modelLinks
An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering python scripts when integrated with McAfee Advanced Threat Defense and Malware Informaton Sharing Platform can defend against new and futuristic cyber attacks.
☆10Updated 6 years ago
Alternatives and similar repositories for automated-threat-intelligent-model
Users that are interested in automated-threat-intelligent-model are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆51Updated last year
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- ☆33Updated 5 months ago
- ☆14Updated 5 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆48Updated last month
- ☆21Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- ☆10Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- Blue Team Powershell Script☆18Updated 3 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆14Updated 7 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Updated 5 years ago
- Automatted Purple Team Script☆30Updated 4 years ago
- Manticore Adversary Emulation Cli☆48Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated last week
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆13Updated 5 years ago