DecryptMike / DecryptMike-Log-AnalyzerLinks
Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. Built For Threat Detection And Security Analysis.
☆19Updated 2 months ago
Alternatives and similar repositories for DecryptMike-Log-Analyzer
Users that are interested in DecryptMike-Log-Analyzer are comparing it to the libraries listed below
Sorting:
- ☆65Updated 2 years ago
- ☆55Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆98Updated 6 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated 4 months ago
- ☆35Updated 3 months ago
- Automate Scoping, OSINT and Recon assessments.☆96Updated 5 months ago
- Challenge Python☆19Updated 2 years ago
- ☆21Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Updated 2 years ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆135Updated last month
- Discovering Typo Squatting on your domains!☆71Updated 11 months ago
- ☆40Updated 6 months ago
- ☆12Updated 3 years ago
- ☆34Updated 2 years ago
- ☆13Updated 2 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆104Updated 11 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆82Updated last month
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆76Updated 2 years ago
- Track C2 servers, tools, and botnets over time by framework and location☆40Updated 5 months ago
- ☆78Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆74Updated 2 years ago
- Sniffing out well-known threat groups☆50Updated 11 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆41Updated last week
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆137Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆109Updated last month
- MayorSec DNS Enumeration Tool☆87Updated 7 months ago
- ☆28Updated 10 months ago