DecryptMike / DecryptMike-Log-AnalyzerLinks
Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. Built For Threat Detection And Security Analysis.
☆19Updated 5 months ago
Alternatives and similar repositories for DecryptMike-Log-Analyzer
Users that are interested in DecryptMike-Log-Analyzer are comparing it to the libraries listed below
Sorting:
- ☆35Updated 6 months ago
- ☆65Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆91Updated 4 months ago
- Challenge Python☆19Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆44Updated 3 months ago
- ☆13Updated 2 years ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆138Updated 4 months ago
- ☆55Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- ☆28Updated last year
- ☆41Updated 9 months ago
- ☆56Updated 3 weeks ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Updated 7 months ago
- Discovering Typo Squatting on your domains!☆73Updated last year
- Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
- Automate Scoping, OSINT and Recon assessments.☆97Updated last week
- Web Hacking and Red Teaming MindMap☆76Updated 2 months ago
- Various PowerShell scripts that may be useful during red team exercise☆21Updated 3 years ago
- ☆78Updated 2 years ago
- ☆34Updated 2 years ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆101Updated 3 months ago
- PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in fi…☆177Updated 2 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 3 years ago
- ☆126Updated 4 months ago
- Capture screenshots of onion services on an onion service.☆71Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆100Updated 9 months ago
- ☆22Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year