ytisf / polarising-pineLinks
Set of PoC for exploits for QRadar SIEM
☆15Updated 7 years ago
Alternatives and similar repositories for polarising-pine
Users that are interested in polarising-pine are comparing it to the libraries listed below
Sorting:
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- ☆52Updated 7 years ago
- Parses Java Cache IDX files☆40Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Updated 7 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Updated 6 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 6 years ago
- ☆14Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 6 years ago
- HoneySAP: SAP Low-interaction research honeypot☆51Updated 2 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Spam trap management☆23Updated last year
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 8 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 5 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 7 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Updated 9 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- ☆26Updated 5 years ago