tshark + ELK analytics virtual machine
☆68Jan 31, 2025Updated last year
Alternatives and similar repositories for tsharkVM
Users that are interested in tsharkVM are comparing it to the libraries listed below
Sorting:
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Jun 3, 2021Updated 4 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Jan 10, 2022Updated 4 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- ☆44Aug 3, 2021Updated 4 years ago
- Python package providing a simple interface to manipulate Elasticsearch queries and aggregations☆11Feb 5, 2026Updated 3 weeks ago
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Dec 1, 2022Updated 3 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Autopsy Module to analyze Registry Hives☆16Feb 18, 2022Updated 4 years ago
- ☆100Nov 10, 2021Updated 4 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Webshell, Virtual Private Server (VPS) and cPanel Database☆39Sep 2, 2022Updated 3 years ago
- Script for pcap modification, reconstruction and anonymization☆18Updated this week
- OptionsBleed (CVE-2017-9798) PoC / Scanner☆18May 21, 2024Updated last year
- Code to aggregate tcpdump traffic and send to ELK (Elasticsearch-Logstach-Kibana)☆17Sep 9, 2016Updated 9 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Feb 15, 2022Updated 4 years ago
- Post exploitation tool for configuration management servers.☆77Jan 29, 2026Updated last month
- ☆89Feb 11, 2022Updated 4 years ago
- A powerful tool designed for identifying hidden endpoints and sensitive information within JavaScript files on a website.☆30Oct 19, 2023Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Feb 3, 2023Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Linux Evidence Acquisition Framework☆119Sep 30, 2024Updated last year
- Your everyday Linux distribution gone Super Saiyan.☆62Oct 13, 2023Updated 2 years ago
- Automatically spin up infra for phishing☆64Feb 1, 2020Updated 6 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Nov 22, 2023Updated 2 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- Linux startup analyzer☆66Jun 2, 2025Updated 9 months ago
- GUI for Volatility forensics tool written in PyQT5☆60Jun 12, 2021Updated 4 years ago
- ADDS (Active Directory Domain Services)☆28Feb 3, 2026Updated last month
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Aug 6, 2021Updated 4 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- ☆24Feb 2, 2026Updated last month