Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. Built For Threat Detection And Security Analysis.
☆19Apr 30, 2025Updated last year
Alternatives and similar repositories for DecryptMike-Log-Analyzer
Users that are interested in DecryptMike-Log-Analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36Mar 28, 2025Updated last year
- This repository contains various public projects created by the owners of Hybrid Brothers☆21Nov 3, 2023Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆20Jun 6, 2024Updated last year
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆22May 27, 2025Updated 11 months ago
- A massive collection of Cybersecurity papers, guides and reports.☆11Jan 3, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- External C2 is a specification to allow third-party programs to act as a communication layer for Cobalt Strike’s Beacon payload.☆19Jul 17, 2025Updated 10 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- ☆21Nov 19, 2025Updated 6 months ago
- AI-based implant feature☆25Apr 28, 2025Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 11 months ago
- Returns results from Google search.☆52Dec 2, 2022Updated 3 years ago
- ☆16Sep 12, 2022Updated 3 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆65Mar 30, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Blind XSS SVG☆10Mar 27, 2023Updated 3 years ago
- A Powerful XSS,RXSS,BXSS finding tool☆32Oct 29, 2025Updated 6 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated 3 months ago
- A modern, responsive web app for managing comic book collections with analytics, financial tracking, and mobile-friendly browsing. Self-h…☆29Updated this week
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 5 years ago
- A series of python scripts to extract information from Dark Web Applications☆14Mar 26, 2025Updated last year
- A reference implementation for automatically deploying a full-featured IRC server with Let's Encrypt, Anope services, and more☆11Apr 24, 2018Updated 8 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated 2 years ago
- Damn Vulnerable WordPress Site☆51Feb 24, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A simple Python sandbox for helpful LLM data agents☆16May 4, 2025Updated last year
- ☆13Oct 24, 2024Updated last year
- Don't just be a script Kiddie☆12Apr 19, 2023Updated 3 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆14Feb 2, 2025Updated last year
- KQL Cafe Website☆15May 11, 2026Updated last week
- Grafana dashboards in your terminal☆75Apr 10, 2026Updated last month
- ☆13Nov 17, 2021Updated 4 years ago
- Process Hollowing POC in CPP☆19Oct 29, 2020Updated 5 years ago
- Harness the Power of AI for all your reporting needs.☆28Apr 17, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆30Aug 4, 2025Updated 9 months ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- OpenPhish Community Phishing Feed☆26Updated this week
- Config files for my GitHub profile.☆14May 7, 2023Updated 3 years ago
- ☆28Nov 10, 2025Updated 6 months ago
- ☆13Mar 15, 2022Updated 4 years ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago