DecryptMike / DecryptMike-Log-AnalyzerLinks
Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. Built For Threat Detection And Security Analysis.
☆19Updated 4 months ago
Alternatives and similar repositories for DecryptMike-Log-Analyzer
Users that are interested in DecryptMike-Log-Analyzer are comparing it to the libraries listed below
Sorting:
- ☆55Updated last year
- ☆35Updated 5 months ago
- ☆65Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆96Updated 7 months ago
- ☆41Updated 9 months ago
- Challenge Python☆19Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆43Updated 2 months ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆138Updated 4 months ago
- Discovering Typo Squatting on your domains!☆71Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆89Updated 4 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- ☆28Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Updated 7 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- ☆22Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆77Updated last month
- Repository with some necessary information for you to create your PenTest consultancy☆100Updated 8 months ago
- PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in fi…☆169Updated last month
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 7 months ago
- ☆25Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- ☆13Updated 2 years ago
- ☆40Updated this week
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
- ☆34Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- Repository of cybersecurity mindmaps☆33Updated 2 years ago
- ☆78Updated 2 years ago