Giter Site home page Giter Site logo

Mike Johnson's Projects

aleph icon aleph

An Open Source Malware Analysis Pipeline System

anomy icon anomy

Anomy is a Tor anonymiser to aid in Threat Intelligence and Malware Analysis Investigations.

ctireporter icon ctireporter

CTI Reporter is a small flask wiki to help index threat intelligence data

dionaea-bistream-rotation icon dionaea-bistream-rotation

Dionaea Bistreams will fill up most VPS's in a couple of days unless the storage is 100 GB+ In order to over come this you can create a cron job with this bash script or run it manually.

kafka-metrics-reporter icon kafka-metrics-reporter

A custom KafkaMetricsReporter intended to be dropped into a Kafka broker cluster that will send all consumer offset metrics to a configured Graphite server.

malware-filecount-log icon malware-filecount-log

This script will store the file count and directory size into a log file. This can also be sent to slack.

misp icon misp

MISP (core software) - Open Source Threat Intelligence and Sharing Platform

opencti icon opencti

Open Cyber Threat Intelligence Platform

osmedeus icon osmedeus

Fully automated offensive security framework for reconnaissance and vulnerability scanning

pfsense-dashboard icon pfsense-dashboard

A functional and useful dashboard for pfSense that utilizes influxdb, grafana and telegraf

ping-test icon ping-test

Simple Script to check a list of domains and tell you if they are up or down

raccoon icon raccoon

A high performance offensive security tool for reconnaissance and vulnerability scanning

rengine icon rengine

reNgine is a reconnaissance engine(framework) that does end-to-end reconnaissance with the help of highly configurable scan engines and does information gathering about the target web application. reNgine makes use of various open-source tools and makes a configurable pipeline of reconnaissance.

social-engineer-toolkit-docker icon social-engineer-toolkit-docker

The Social-Engineer Toolkit is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly.

threatnote icon threatnote

threatnote | Cyber Threat Intelligence Notebook

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.