vhawk19 / automated-threat-intelligent-modelLinks
An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering python scripts when integrated with McAfee Advanced Threat Defense and Malware Informaton Sharing Platform can defend against new and futuristic cyber attacks.
☆10Updated 6 years ago
Alternatives and similar repositories for automated-threat-intelligent-model
Users that are interested in automated-threat-intelligent-model are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆51Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 10 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- ☆33Updated 8 months ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- ☆14Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- buffer overflow examples☆22Updated 7 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated this week
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Advanced web server fingerprinting☆22Updated 8 years ago
- Manticore Adversary Emulation Cli☆48Updated 5 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 3 months ago
- Kubernetes Scanner☆40Updated 3 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Scout - a Contactless Active Reconnaissance Tool☆54Updated 2 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- Cobalt Strike/C2 Servers☆13Updated 4 years ago
- Simple Live Data Collection Tool☆22Updated 5 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago