This repo contains logstash of various honeypots
☆174Feb 27, 2020Updated 6 years ago
Alternatives and similar repositories for sweetie-data
Users that are interested in sweetie-data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A kinda reckless dns resolver. Still under development.☆16Mar 23, 2020Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆62Aug 8, 2024Updated last year
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 5 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Nov 14, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆80Jul 30, 2020Updated 5 years ago
- Collection of AI and Security Papers☆27Apr 17, 2020Updated 5 years ago
- Lightweight In-App Web Application Firewall for PHP☆42Aug 26, 2020Updated 5 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆66Oct 16, 2020Updated 5 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Fast Static File Analysis Framework☆104Mar 8, 2020Updated 6 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆238Nov 8, 2019Updated 6 years ago
- Words list generator to crack security tokens☆110May 20, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- ☆10Nov 17, 2018Updated 7 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆58Mar 25, 2020Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Apr 24, 2019Updated 6 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆905Feb 25, 2020Updated 6 years ago
- LKRG bypass methods☆74Jan 10, 2020Updated 6 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Security Monitoring Resolution Categories☆137Nov 25, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Nov 18, 2019Updated 6 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆402Nov 12, 2019Updated 6 years ago
- Detecting ATT&CK techniques & tactics for Linux☆257Oct 1, 2020Updated 5 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Open-source framework to detect outliers in Elasticsearch events☆205May 22, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆98Oct 7, 2020Updated 5 years ago
- Re-play Security Events☆1,729Mar 20, 2024Updated 2 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆69Feb 3, 2020Updated 6 years ago
- Building an Active Directory domain and hacking it☆665Dec 23, 2019Updated 6 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- Swiftly search FDNS datasets from Rapid7 Open Data☆23Nov 20, 2022Updated 3 years ago