vhawk19 / automated-threat-intelligent-model
An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering python scripts when integrated with McAfee Advanced Threat Defense and Malware Informaton Sharing Platform can defend against new and futuristic cyber attacks.
☆10Updated 6 years ago
Alternatives and similar repositories for automated-threat-intelligent-model:
Users that are interested in automated-threat-intelligent-model are comparing it to the libraries listed below
- Virtual Security Operations Center☆50Updated last year
- ☆34Updated last month
- ☆12Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆23Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- ☆14Updated 4 years ago
- ☆26Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Updated 4 years ago
- ☆21Updated 3 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆15Updated 3 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆13Updated 5 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- A toolkit to attack Office365☆16Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago