GohaltGohalt 👮♀🛑: Fast; Simple; Powerful; Go Throttler library
Stars: ✭ 253 (-92.3%)
rhqRecon Hunt Queries
Stars: ✭ 66 (-97.99%)
ArgosThis script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (-97.78%)
Perfmon AgentServer metrics fetching agent, based on SIGAR
Stars: ✭ 264 (-91.97%)
AwesomeWallpaperAwesomeWallpaper plays videos, shows images and system info on your desktop wallpaper
Stars: ✭ 74 (-97.75%)
avainA Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Stars: ✭ 56 (-98.3%)
edgeApplication-embedded connectivity and zero-trust components
Stars: ✭ 44 (-98.66%)
YaraHuntsRandom hunting ordiented yara rules
Stars: ✭ 86 (-97.38%)
PymispPython library using the MISP Rest API
Stars: ✭ 254 (-92.27%)
file watchtowerLightweight File Integrity Monitoring Tool
Stars: ✭ 27 (-99.18%)
awesome-intelligence-writingAwesome collection of great and useful resources concerning intelligence writing such as manuals/guides, standards, books, and articles
Stars: ✭ 285 (-91.33%)
ETWNetMonv3ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detection by VirtualMemAlloc Events (in-memory) etc.
Stars: ✭ 32 (-99.03%)
MicrometerAn application metrics facade for the most popular monitoring tools. Think SLF4J, but for metrics.
Stars: ✭ 3,173 (-3.47%)
HelkThe Hunting ELK
Stars: ✭ 3,097 (-5.78%)
Ansible PrometheusAn Ansible role that installs Prometheus, in the format for Ansible Galaxy.
Stars: ✭ 256 (-92.21%)
rstthreatsAggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-99.48%)
PowerGRRPowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.
Stars: ✭ 52 (-98.42%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (-93.19%)
irmaenpoint detection / live analysis & sandbox host / signatures quality test
Stars: ✭ 25 (-99.24%)
Rz GoRipzap - Fast and 0 allocs leveled JSON logger for Go ⚡️. Dependency free.
Stars: ✭ 256 (-92.21%)
SIGMA-detection-rulesSet of SIGMA rules (>250) mapped to MITRE Att@k tactic and techniques
Stars: ✭ 97 (-97.05%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-97.6%)
SSHapendoesCapture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-99.06%)
QuestdbAn open source SQL database designed to process time series data, faster
Stars: ✭ 7,544 (+129.51%)
Exporterhub.ioA Curated List of Prometheus Exporters
Stars: ✭ 252 (-92.33%)
ELK-HuntingThreat Hunting with ELK Workshop (InfoSecWorld 2017)
Stars: ✭ 58 (-98.24%)
cif-v5The FASTEST way to consume threat intel.
Stars: ✭ 53 (-98.39%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (-96.68%)
K8sImportant production-grade Kubernetes Ops Services
Stars: ✭ 253 (-92.3%)
ps-srum-huntingPowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting
Stars: ✭ 16 (-99.51%)
thremulation-stationSmall-scale threat emulation and detection range built on Elastic and Atomic Redteam.
Stars: ✭ 28 (-99.15%)
XestimonitorsAn extensible monitoring framework written in Swift
Stars: ✭ 269 (-91.82%)
EasyloggingppSingle header C++ logging library. It is extremely powerful, extendable, light-weight, fast performing, thread and type safe and consists of many built-in features. It provides ability to write logs in your own customized format. It also provide support for logging your classes, third-party libraries, STL and third-party containers etc.
Stars: ✭ 3,032 (-7.76%)
DnstwistDomain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (-4.96%)
ElectriceyeContinuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (-92.24%)
fastfinderIncident Response - Fast suspicious file finder
Stars: ✭ 116 (-96.47%)
ScoutScout - a Contactless Active Reconnaissance Tool
Stars: ✭ 48 (-98.54%)
DomainCATDomain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
Stars: ✭ 34 (-98.97%)
SWELFSimple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Stars: ✭ 23 (-99.3%)
Hangfire.JobsLoggerA Hangfire extension to store a log during job execution.
Stars: ✭ 21 (-99.36%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-97.72%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-98.14%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-99.45%)
ZircoliteA standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
Stars: ✭ 443 (-86.52%)
GravPerformance visualisation tools
Stars: ✭ 262 (-92.03%)
good-influxInfluxDB broadcasting for Good process monitor
Stars: ✭ 15 (-99.54%)
Vendor-Threat-Triage-LookupLookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.
Stars: ✭ 17 (-99.48%)
ioc-fangerFang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Stars: ✭ 47 (-98.57%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (-91.45%)