Ahmed-AL-Maghraby / SIEM-Cheat-SheetView external linksLinks
SIEM Cheat Sheet
☆80Aug 15, 2023Updated 2 years ago
Alternatives and similar repositories for SIEM-Cheat-Sheet
Users that are interested in SIEM-Cheat-Sheet are comparing it to the libraries listed below
Sorting:
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆51Feb 10, 2026Updated last week
- Splunk app to monitor the /etc directory of Splunk for all changes of .conf files☆13Jan 26, 2018Updated 8 years ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 5 months ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆11May 15, 2020Updated 5 years ago
- MalBox is a quick and dirty setup to create a malware analysis VM☆14Aug 27, 2024Updated last year
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tran☆13May 27, 2023Updated 2 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- A powershell based traffic generation scripts to simulate user activity via Internet Explorer☆15May 6, 2015Updated 10 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Apr 6, 2025Updated 10 months ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- A collection of tools, scripts and personal research☆155Feb 2, 2026Updated 2 weeks ago
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆22Jan 1, 2023Updated 3 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- ☆34Apr 29, 2021Updated 4 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Mar 23, 2022Updated 3 years ago
- A running list of Windows sources and the related event ids.☆19Aug 2, 2023Updated 2 years ago
- ☆42Mar 6, 2023Updated 2 years ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- Legacy Sigma Tools (sigmac etc.)☆15May 7, 2023Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- I used the Templater community plugin in obsidian to automatically populate IP,username,password☆43Sep 11, 2023Updated 2 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆124Feb 12, 2022Updated 4 years ago
- Tool that checks for path traversal traces in a given web application url, plus it is capable of multi-threading, set timeout and 5-layer…☆46Jul 13, 2018Updated 7 years ago
- A repo that contains a recursive dump from the ROOT key of every Windows Registry hive (using KAPE) from a vanilla (clean) install of eve…☆54Oct 29, 2025Updated 3 months ago
- ☆18Feb 16, 2021Updated 5 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 3 years ago
- A collection of PoCs for different injection techniques on Windows!☆49Aug 27, 2023Updated 2 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Oct 26, 2025Updated 3 months ago
- ☆22Aug 29, 2024Updated last year
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Aug 20, 2024Updated last year
- CSbyGB - Gabrielle B's new Blog!☆23Jul 29, 2025Updated 6 months ago
- ☆21Aug 28, 2022Updated 3 years ago
- Collection of YARA signatures from individual research☆45Nov 20, 2023Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆47Apr 17, 2022Updated 3 years ago