Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. Built For Threat Detection And Security Analysis.
☆19Apr 30, 2025Updated last year
Alternatives and similar repositories for DecryptMike-Log-Analyzer
Users that are interested in DecryptMike-Log-Analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36Mar 28, 2025Updated last year
- This repository contains various public projects created by the owners of Hybrid Brothers☆21Nov 3, 2023Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆19Jun 6, 2024Updated last year
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆22May 27, 2025Updated 11 months ago
- A massive collection of Cybersecurity papers, guides and reports.☆11Jan 3, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Proxy Management for Security Professionals☆25Mar 25, 2025Updated last year
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 4 months ago
- External C2 is a specification to allow third-party programs to act as a communication layer for Cobalt Strike’s Beacon payload.☆18Jul 17, 2025Updated 9 months ago
- PoC☆12Apr 7, 2025Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 4 years ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- ☆21Nov 19, 2025Updated 5 months ago
- AI-based implant feature☆25Apr 28, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- Returns results from Google search.☆52Dec 2, 2022Updated 3 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 3 years ago
- A modern, responsive web app for managing comic book collections with analytics, financial tracking, and mobile-friendly browsing. Self-h…☆29Apr 24, 2026Updated last week
- A flexible cross-platform post-exploitation agent written in Go with basic functionalities☆17Mar 27, 2019Updated 7 years ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 5 years ago
- A reference implementation for automatically deploying a full-featured IRC server with Let's Encrypt, Anope services, and more☆11Apr 24, 2018Updated 8 years ago
- Damn Vulnerable WordPress Site☆52Feb 24, 2023Updated 3 years ago
- A platform to automate and orchestrate security rules for governance, risk and compliance, and continuous assurance.☆40Apr 9, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- Distributed nmap.☆13May 25, 2023Updated 2 years ago
- ☆13Oct 24, 2024Updated last year
- Don't just be a script Kiddie☆12Apr 19, 2023Updated 3 years ago
- An example of how using runit in Docker containers.☆13Aug 15, 2024Updated last year
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- KQL Cafe Website☆15Apr 11, 2026Updated 2 weeks ago
- Alternative "security" module for Brazilian banks☆15Nov 25, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- OpenPhish Community Phishing Feed☆24Updated this week
- implementation of queue using circular buffer and table doubling☆13Apr 17, 2020Updated 6 years ago
- Process Hollowing POC in CPP☆19Oct 29, 2020Updated 5 years ago
- HackAgent is an open-source security toolkit to detect vulnerabilities of your AI Agents☆43Apr 24, 2026Updated last week
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆31Feb 6, 2026Updated 2 months ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Simple HTTP async comms using standard GET/POST requests☆49Feb 5, 2026Updated 2 months ago