vhawk19 / automated-threat-intelligent-modelLinks
An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering python scripts when integrated with McAfee Advanced Threat Defense and Malware Informaton Sharing Platform can defend against new and futuristic cyber attacks.
☆10Updated 6 years ago
Alternatives and similar repositories for automated-threat-intelligent-model
Users that are interested in automated-threat-intelligent-model are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆52Updated 2 years ago
- ☆33Updated 10 months ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- ☆14Updated 5 years ago
- Manticore Adversary Emulation Cli☆47Updated 5 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last week
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- ☆10Updated 5 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 10 years ago
- Cobalt Strike/C2 Servers☆13Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- buffer overflow examples☆22Updated 7 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆67Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Updated 7 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 5 months ago
- ☆22Updated 4 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆23Updated 2 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago