These files contain configuration for producing EDR (endpoint detection and response) data in addition to standard system logs. These configurations enable...
DumpsterFire Toolset – “Security Incidents In A Box!” The DumpsterFire Toolset is a modular, menu-driven, cross-platform tool for building repeatable, time-delayed,...
ArmourBird CSF – Container Security Framework is an extensible, modular, API-first framework build for regular security monitoring of docker installations and...
Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed...
The risk level regarding Active Directory security has changed. Several vulnerabilities have been made popular with tools like mimikatz or sites...
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of...
This software project is a result of a Bachelor’s thesis created at SCHUTZWERK in collaboration with Aalen University by Philipp Schmied.Please refer...
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. The...
Microsoft signed DLL for the ActiveDirectory PowerShell module Just a backup for the Microsoft’s ActiveDirectory PowerShell module from Server 2016 with RSAT...
Nubia is a lightweight framework for building command-line applications with Python. It was originally designed for the “logdevice interactive shell (aka. ldshell)”...
Telebix is an application that communicates with a Bot on the Telegram to receive commands and send information from an infrastructure monitored...
PatrOwl is a scalable, free and open-source solution for orchestrating Security Operations. PatrowlManager is the Front-end application for managing the assets, reviewing...
Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high level of...
A framework based on the Fiddler web debugger to study Exploit Kits, malvertising and malicious traffic in general. Installation Download and install...
Investigate malicious logon by visualizing and analyzing Windows active directory event logs. Concept LogonTracer associates a host name (or an IP address)...
GlobaLeaks is open-source / free software intended to enable secure and anonymous whistleblowing initiatives developed by the Hermes Center for Transparency and...
Automate SSH communication with firewalls, switches, etc. Description These scripts are designed to automate sending commands to a Cisco ASA firewall. The...