A few quick recipes for those that do not have much time during the day
☆22Oct 28, 2024Updated last year
Alternatives and similar repositories for infosec-well-done
Users that are interested in infosec-well-done are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- ☆14Feb 22, 2021Updated 5 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 5 months ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆56Jan 24, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆17Aug 10, 2022Updated 3 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- ☆16Dec 16, 2020Updated 5 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Feb 13, 2021Updated 5 years ago
- ☆44Jul 11, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- ☆15Feb 1, 2019Updated 7 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- ☆11Nov 13, 2024Updated last year
- Web UI for testing Elastic Beats processors☆18Feb 22, 2026Updated last month
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆27Apr 1, 2026Updated 2 weeks ago
- ☆21Nov 19, 2025Updated 5 months ago
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code samples for SQL Server Discovery using the Microsoft Assessment and Planning (MAP) toolkit☆11Dec 9, 2020Updated 5 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- ☆12Jun 24, 2024Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- ☆27Feb 6, 2022Updated 4 years ago
- ☆19Apr 5, 2026Updated last week
- ☆23Jun 1, 2022Updated 3 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆46Mar 2, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- Mine patterns from logs☆27Dec 12, 2016Updated 9 years ago
- The New Windows Installer for FusionInventory Agent☆11Mar 3, 2022Updated 4 years ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Jul 30, 2024Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- Quickly create workflows, business and process automation pipelines. Supports API, UI and Cron based workflows.☆30Feb 7, 2024Updated 2 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 10 years ago