Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. Built For Threat Detection And Security Analysis.
☆19Apr 30, 2025Updated 10 months ago
Alternatives and similar repositories for DecryptMike-Log-Analyzer
Users that are interested in DecryptMike-Log-Analyzer are comparing it to the libraries listed below
Sorting:
- ☆36Mar 28, 2025Updated 11 months ago
- This repository contains various public projects created by the owners of Hybrid Brothers☆21Nov 3, 2023Updated 2 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 3 months ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- PoC☆12Apr 7, 2025Updated 11 months ago
- My personal (developer) website!☆14Dec 3, 2025Updated 3 months ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆18Mar 6, 2025Updated last year
- ☆21Nov 19, 2025Updated 4 months ago
- ☆16Sep 12, 2022Updated 3 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- A flexible cross-platform post-exploitation agent written in Go with basic functionalities☆17Mar 27, 2019Updated 6 years ago
- .domino☆15Feb 24, 2026Updated 3 weeks ago
- My simple portfolio in a retro game style☆16Feb 16, 2026Updated last month
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 5 years ago
- A platform to automate and orchestrate security rules for governance, risk and compliance, and continuous assurance.☆39Mar 12, 2026Updated last week
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- HackAgent is an open-source security toolkit to detect vulnerabilities of your AI Agents☆37Mar 13, 2026Updated last week
- Md5 碰撞生成实现,去掉了boost依赖,简化编译☆12Jan 25, 2018Updated 8 years ago
- Modifications and enhancements to the CUPS system.☆22Mar 6, 2015Updated 11 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- ☆13Oct 24, 2024Updated last year
- Don't just be a script Kiddie☆12Apr 19, 2023Updated 2 years ago
- An example of how using runit in Docker containers.☆13Aug 15, 2024Updated last year
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- A portfolio website made to learn HTML and CSS concepts as part of Angela Yu's web development course.☆13Sep 8, 2021Updated 4 years ago
- Alternative "security" module for Brazilian banks☆15Nov 25, 2020Updated 5 years ago
- OpenPhish Community Phishing Feed☆22Updated this week
- ☆13Nov 17, 2021Updated 4 years ago
- Process Hollowing POC in CPP☆19Oct 29, 2020Updated 5 years ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆29Aug 4, 2025Updated 7 months ago
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆29Feb 6, 2026Updated last month
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- A repository dedicated to sharing Indicators of Compromise (IOCs) from production systems experiencing security incidents and OSINT feeds…☆48Updated this week
- ☆17Jul 20, 2024Updated last year
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 10 months ago
- ☆13Mar 15, 2022Updated 4 years ago