The Official Github Repository of Daemonlogger
☆22Apr 15, 2021Updated 4 years ago
Alternatives and similar repositories for Daemonlogger
Users that are interested in Daemonlogger are comparing it to the libraries listed below
Sorting:
- ☆24Feb 2, 2026Updated last month
- Repository to track keywords & patterns lists used by crowdsec parsers and scenarios☆16Updated this week
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Decept Network Protocol Proxy☆279Jan 20, 2023Updated 3 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- WebUI of MineMeld☆42Mar 16, 2023Updated 2 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆441Jul 7, 2021Updated 4 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- A 4x4x4 Tic-Tac-Toe game suitable for porting to embedded hardware platforms☆11Sep 6, 2017Updated 8 years ago
- ☆173Jul 7, 2021Updated 4 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- Graphical model of a TCP/IP stack which can be used as a cheatsheet when developing BPF filters.☆16Dec 10, 2019Updated 6 years ago
- Portable MurmurHash Implementation☆11Feb 19, 2024Updated 2 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- ☆46Apr 6, 2017Updated 8 years ago
- LLM prompt attacks for hacker CTFs via CTFd.☆15Dec 17, 2023Updated 2 years ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- A bunch of C functions that are useful when writing simple code☆14Oct 5, 2024Updated last year
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆74Jun 18, 2024Updated last year
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 6 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Jul 2, 2023Updated 2 years ago
- Ready to run scripts for network analysis☆91Mar 20, 2025Updated 11 months ago
- Flask API for generating text embeddings using OpenAI or sentence_transformers☆14Sep 1, 2023Updated 2 years ago
- Nagios plugin - check docker (cpu / mem / bandwidth)☆13Feb 6, 2023Updated 3 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated last month
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- Suricata rule and intel index☆33Jan 13, 2026Updated last month
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆55Dec 4, 2022Updated 3 years ago
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Syslog Deduplicator☆16May 20, 2013Updated 12 years ago
- ☆14May 18, 2022Updated 3 years ago
- Command line $MFT record decoder☆12May 20, 2017Updated 8 years ago
- A tool for detecting sensitive data in code repositories☆18Feb 25, 2026Updated last week
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- Simple Beat for Logstash (v5+) statistics☆13Nov 23, 2016Updated 9 years ago