DecryptMike / DecryptMike-Log-AnalyzerLinks
Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. Built For Threat Detection And Security Analysis.
☆18Updated last month
Alternatives and similar repositories for DecryptMike-Log-Analyzer
Users that are interested in DecryptMike-Log-Analyzer are comparing it to the libraries listed below
Sorting:
- ☆20Updated 2 years ago
- ☆64Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- ☆12Updated 3 years ago
- ☆13Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 3 months ago
- ☆34Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 10 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 7 months ago
- ☆41Updated 5 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- ☆21Updated last week
- Python for Defenders Course Resources☆18Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 3 months ago
- ☆34Updated last year
- Web Hacking and Red Teaming MindMap☆73Updated 2 years ago
- ☆27Updated 8 months ago
- Simultaneously search CVEs and exploits across multiple cybersecurity data sources.☆13Updated 3 years ago
- ☆31Updated 2 months ago
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- ☆39Updated 5 months ago