SiemSIEM Tactics, Techiques, and Procedures
Stars: ✭ 157 (-87.42%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-92.87%)
MeerkatA collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Stars: ✭ 284 (-77.24%)
WELAWELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Stars: ✭ 442 (-64.58%)
Threatbus🚌 The missing link to connect open-source threat intelligence tools.
Stars: ✭ 139 (-88.86%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (-27.24%)
lCross-platform html/io [L]ogger with simple API.
Stars: ✭ 26 (-97.92%)
ScrummageThe Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (-71.55%)
paStashpastaʃ'ʃ = Spaghetti I/O Event Data Processing, Interpolation, Correlation and beyond 🍝
Stars: ✭ 89 (-92.87%)
ULogViewerCross-Platform Universal Log Viewer.
Stars: ✭ 64 (-94.87%)
TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-98.32%)
SysmonResourcesConsolidation of various resources related to Microsoft Sysmon & sample data/log
Stars: ✭ 64 (-94.87%)
SSHapendoesCapture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-97.52%)
Mimir📱 A simple & efficient iOS logging framework for high usage apps
Stars: ✭ 13 (-98.96%)
Vulnerability Data ArchiveWith the hope that someone finds the data useful, we periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
Stars: ✭ 63 (-94.95%)
bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (-97.52%)
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (-79.49%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+136.86%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+179.25%)
Misp GalaxyClusters and elements to attach to MISP events or attributes (like threat actors)
Stars: ✭ 276 (-77.88%)
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (-74.04%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-94.15%)
mail to mispConnect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Stars: ✭ 61 (-95.11%)
Sagan** README ** This repo has MOVED to https://github.com/quadrantsec/sagan
Stars: ✭ 236 (-81.09%)
Serverless Es LogsA Serverless plugin to transport logs to ElasticSearch
Stars: ✭ 51 (-95.91%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (-91.27%)
addon-log-viewerLog Viewer - Home Assistant Community Add-ons
Stars: ✭ 37 (-97.04%)
Wazuh DockerWazuh - Docker containers
Stars: ✭ 213 (-82.93%)
sqhunterA simple threat hunting tool based on osquery, Salt Open and Cymon API
Stars: ✭ 64 (-94.87%)
wazuh-packagesWazuh - Tools for packages creation
Stars: ✭ 54 (-95.67%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (-82.05%)
ptkdev-logger🦒 Beautiful Logger for Node.js: the best alternative to the console.log statement
Stars: ✭ 117 (-90.62%)
PoShLog🔩 PoShLog is PowerShell cross-platform logging module. It allows you to log structured event data into console, file and much more places easily. It's built upon great C# logging library Serilog - https://serilog.net/
Stars: ✭ 108 (-91.35%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (-83.25%)
pybinaryedgePython 3 Wrapper for the BinaryEdge API https://www.binaryedge.io/
Stars: ✭ 16 (-98.72%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-96.39%)
DnstwistDomain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+150.32%)
OSINT-BrazucaRepositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Stars: ✭ 508 (-59.29%)
VfeedThe Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (-33.81%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (-70.91%)
IronNetTRThreat research and reporting from IronNet's Threat Research Teams
Stars: ✭ 36 (-97.12%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+435.02%)
KlaraKaspersky's GReAT KLara
Stars: ✭ 565 (-54.73%)
ThreatingestorExtract and aggregate threat intelligence.
Stars: ✭ 439 (-64.82%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-94.47%)
BesafeBeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-98.32%)
GollumAn n:m message multiplexer written in Go
Stars: ✭ 883 (-29.25%)
WhidsOpen Source EDR for Windows
Stars: ✭ 188 (-84.94%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (-83.57%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-98.24%)