mordor
Infosec_Reference
mordor | Infosec_Reference | |
---|---|---|
6 | 9 | |
1,551 | 5,362 | |
0.9% | - | |
5.6 | 4.2 | |
about 2 months ago | 18 days ago | |
PowerShell | CSS | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mordor
- SOC with machine learning
-
What tooling/scripts/capability would your Blueteam benefit from? Add your wish to the comments 👇🏿 and it might come true..
https://github.com/OTRF/Security-Datasets -> Any table in sentinel
- Dummy security logs to practice with team?
-
Cybersecurity bootcamp
Cloud resources (like Simuland: https://github.com/Azure/SimuLand ) might let you spin up your environment without at-home resources, but you can also learn about what attacks look like and how they work in defenses using something like the OTRF project: https://github.com/OTRF/Security-Datasets
-
Simplest path to ECS-formatted winlogbeat style json file import
To get started as easily as possible we’re looking to use data from the security datasets (formerly Mordor) project https://github.com/OTRF/Security-Datasets and converting some of this data to winlogbeat/ECS using this tool: https://github.com/barvhaim/mordor2ecs
-
How to grt better/ homelab help
Exactly! Either inline, or mirror your traffic via SPAN - assuming quite a lot of phones, tablets and other gear you‘ll definitely start spotting some not-so-hot traffic quite soon. In case you can arrange for a public IP at home, start tapping in and profile your visitors. In case you deem your homenet too boring - as mentioned - Mordor - hit your Onion with actual malicious traffic: https://github.com/OTRF/mordor
Infosec_Reference
- How to improve documentation / technical writing skills?
- Manuals
-
Cybersecurity Repositories
Infosec Reference
- About Russia's Industrial Control System Attacks...
- Advise please?
- I'm preparing for the interview and I've curated a list of resources that might be helpful for you also.
-
Noob questions and advice
There’s this: https://github.com/rmusser01/Infosec_Reference
-
How to grt better/ homelab help
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Building_A_Lab.md Has some ideas. The first things to decide on would be what do you want to use for your hosting environment. Do you want to run ESXi? HyperV? Xen? Something else? What do you want to learn? What sort of environments do you want to simulate?
- Cybersec Bootcamp
What are some alternatives?
HELK - The Hunting ELK
API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API
ecs-mapper - Translate an ECS mapping CSV to starter pipelines for Beats, Elasticsearch or Logstash
hackdroid - Security Apps for Android
loglizer - A machine learning toolkit for log-based anomaly detection [ISSRE'16]
red_team_attack_lab - Red Team Attack Lab for TTP testing & research
mordor2ecs - Windows log to ECS format for Mordor large dataset
the_cyber_plumbers_handbook - Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
AlanFramework - A C2 post-exploitation framework
bugbounty-cheatsheet - A list of interesting payloads, tips and tricks for bug bounty hunters.
awesome-web-hacking - A list of web application security
MAL-CL - MAL-CL (Malicious Command-Line)