-
Defensive Depth Consulting
- USA
- https://DefensiveDepth.com
- @DefensiveDepth
Stars
An opensource sigma conversion tool built using pysigma
AWS, Azure, Alibaba and Google bucket scanner
AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.
CLI tool for open source and threat intelligence
A query aggregator for OSINT based threat hunting
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
🥧 HTTPie CLI — modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more.
A repository hosting example goodware evtx logs containing sample software installation and basic user interaction
Slack enumeration and exposed secrets detection tool
A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
Warning lists to inform users of MISP about potential false-positives or other information in indicators
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections…
Open-source platform for IT, security, and infrastructure teams. (Linux, macOS, Chrome, Windows, cloud, data center)
Public Repo for Atomic Test Harness
Procmon is a Linux reimagining of the classic Procmon tool from the Sysinternals suite of tools for Windows. Procmon provides a convenient and efficient way for Linux developers to trace the syscal…
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.
Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber
Elastic Beat for fetching and shipping Office 365 audit events
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more