SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.
☆19Jan 9, 2020Updated 6 years ago
Alternatives and similar repositories for Log-Analysis
Users that are interested in Log-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- I use all of scripts in this repository daily and schedule them to control my systems. Also, it includes all of my penetration tests scri…☆30Jun 26, 2022Updated 3 years ago
- Python for Hackers course sample codes.☆46Sep 30, 2020Updated 5 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- I built this game for a short time fun.☆10Mar 31, 2014Updated 11 years ago
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 5 years ago
- Blockchain server, mining server and proof-of-work, python power☆13Dec 5, 2019Updated 6 years ago
- OpenEMR 5.0.1 allows an authenticated attacker to upload and execute malicious php codes.☆14Jan 20, 2021Updated 5 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 3 years ago
- Hackme is a network security answer platform,Hackme网络安全答题平台☆10Nov 5, 2015Updated 10 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Sep 6, 2021Updated 4 years ago
- Türkçe Django (1.9) (Python 2) Makaleleri. Teknik servis formu projesi☆13Jan 21, 2016Updated 10 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆47Dec 16, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- USB testing framework☆14May 22, 2023Updated 2 years ago
- Mustafa Akgül Özgür Yazılım Yaz Kampı Sistem Yönetimi Eğitimi☆12Nov 5, 2018Updated 7 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 2 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- 跨平台服务器文件安全监控软件,支持短信预警☆10Apr 11, 2017Updated 8 years ago
- Open source snake stairs game project ;)☆15Aug 12, 2018Updated 7 years ago
- OSCP Scripts☆14Jan 21, 2016Updated 10 years ago
- ☆25Oct 14, 2017Updated 8 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 监控公司网站的URL,是否符合预期,如不符发邮件报警☆11Nov 18, 2021Updated 4 years ago
- 根据Golismero源码二次开发的分布式漏洞扫描器(调试版)☆18Jul 25, 2016Updated 9 years ago
- 超简单的日志分析,go练手☆10Aug 11, 2017Updated 8 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Feb 26, 2018Updated 8 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆23Nov 9, 2018Updated 7 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- ☆16Dec 8, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆13Apr 6, 2016Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 8 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆34Nov 6, 2017Updated 8 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago