SIEM Visibility assessment
☆14May 22, 2023Updated 2 years ago
Alternatives and similar repositories for SIEVA
Users that are interested in SIEVA are comparing it to the libraries listed below
Sorting:
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Feb 14, 2026Updated 2 weeks ago
- MCP use case for SecOps automation w/ Splunk,CrowdStrike EDR, MISP☆21Jul 7, 2025Updated 7 months ago
- Code to Scraping some portion of Data from forum(RaidForums[seized by FBI]) with Python SCRAPY spiders bypassing recaptcha and storing to…☆10Feb 25, 2021Updated 5 years ago
- Chef receipe to setup L2TP over IPSec VPN, or IPSec tunneling site-to-site VPN using openswan.☆17Jun 12, 2015Updated 10 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Professional RAG development skills for Claude Code - audit, evaluate, optimize, and scaffold RAG pipelines☆24Jan 18, 2026Updated last month
- Recordization library☆11Updated this week
- Backup solution with only bash and rsync, for incremental full backups☆11Feb 23, 2025Updated last year
- ☆10Sep 12, 2024Updated last year
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- A collection of tools for debugging Windows application crashes.☆18Nov 24, 2022Updated 3 years ago
- An API client for Jira Insight☆12May 27, 2022Updated 3 years ago
- Decentralized DNS fuzzer to mitigate ISP Snooping☆13May 3, 2017Updated 8 years ago
- Developer centric data transformation for true tech & data ownership. DBT for Streaming Data Mesh☆13Sep 30, 2025Updated 5 months ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆44Dec 30, 2024Updated last year
- ☆10Jun 14, 2016Updated 9 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Various Topics☆18Apr 30, 2025Updated 10 months ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- This is a utility to help out when you've misplaced a little bit of your Algorand account mnemonic.☆17Oct 9, 2021Updated 4 years ago
- OpenKeyFinder is a Proof of Concept tool designed to retrieve OpenAI API Keys exposed on GitHub,☆13Sep 7, 2023Updated 2 years ago
- Codecave miner☆14Dec 21, 2022Updated 3 years ago
- Siyazana is an isiZulu word that means we know each other or we are connected. This website has been designed to provide users with a too…☆15Sep 22, 2018Updated 7 years ago
- glassdoor is a modern, autonomous security framework for Android APKs. POC, unmaintained unfortunately.☆14Jul 28, 2017Updated 8 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 5 months ago
- proof of concept of user-mode anti-breakpoint technique☆16Sep 15, 2023Updated 2 years ago
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆20Mar 11, 2014Updated 11 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Resources and solutions of various technologies that I am currently learning☆13Aug 26, 2023Updated 2 years ago
- ☆13Jun 29, 2021Updated 4 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆14Jan 23, 2023Updated 3 years ago
- Google Drive permission audit tool☆19Jul 4, 2023Updated 2 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago