GitHub is where people build software. More than 100 million people use GitHub to discover, fork, and contribute to over 420 million projects.
JA4+ is a suite of network fingerprinting methods that are easy to use and easy to share. These methods are both human and machine readable to facilitate more effective threat-hunting and analysis. The use-cases for these fingerprints include scanning for threat actors, malware detection, sessio...
GitHub is where people build software. More than 100 million people use GitHub to discover, fork, and contribute to over 420 million projects.
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management 14 contributions in the last year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Mon Wed Fri Learn how we count contributions. Less More 2021 2020 Contribution activity ...
GitHub is where people build software. More than 100 million people use GitHub to discover, fork, and contribute to over 420 million projects.
[4星][2y] [Py] whonix/control-port-filter-python [Deprecated in Whonix 14] - new project name -> https://github.com/Whonix/onion-grater [2星][3y] [C] epidemics-scepticism/all-the-onions Cryptographers hate him! Find every Tor hidden service address with this one weird trick! [2星]...
openPOWERLINK_V2 - GitHub page to openPOWERLINK protocol stack release 2 ProConOs NameProConOs Description Real-time operating system with proprietary protocol for industrial automation and control Port 20547/tcp Nmap script(s) proconos-info.nse Detailed page proconos.md Profinet-DCP NameProfinet-DCP Al...
On the attacker’s side, we have to prepare anLDAPserver that includes the payload we want to execute on the target server. In this case, we will use a tool published by @pimps (https://github.com/pimps/JNDI-Exploit-Kit), a fork of the project created by @welk1n. ...
(jailbreaking) the agents, installing multiple networking libraries to enable the wireless interface, and then create boot up scripts to start the wireless interface, get it connected, and change the routing to default to the wireless interface. You can find the code and guide at thisGitHub ...
Cyber Threat hunting is a proactive search for known attack behaviors in the organizational information system. It is an important component to mitigate advanced persistent threats (APTs). However, the attack behaviors recorded in provenance data may not