vhawk19 / automated-threat-intelligent-modelLinks
An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering python scripts when integrated with McAfee Advanced Threat Defense and Malware Informaton Sharing Platform can defend against new and futuristic cyber attacks.
☆10Updated 7 years ago
Alternatives and similar repositories for automated-threat-intelligent-model
Users that are interested in automated-threat-intelligent-model are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆52Updated 2 years ago
- ☆33Updated last year
- This contains common OSCP local exploits and enumeration scripts☆12Updated 10 years ago
- ☆14Updated 5 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- Manticore Adversary Emulation Cli☆47Updated 5 years ago
- Virus Total Free - IOC parser and report generator☆24Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- A toolkit to attack Office365☆16Updated 6 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 5 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last month
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Updated 2 years ago
- Scripts for OSCE☆18Updated 7 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 6 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 5 years ago
- ☆10Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Updated 8 years ago