DockerFiles for Docker Containers
☆16Sep 2, 2017Updated 8 years ago
Alternatives and similar repositories for DockerFiles
Users that are interested in DockerFiles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Terminal Forensics CheatSheets☆13Jul 28, 2015Updated 10 years ago
- A program that uses xapian to index the flat file databases used by nfdump or flow-tools☆36Mar 26, 2018Updated 8 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20May 13, 2017Updated 8 years ago
- Powershell攻击指南----黑客后渗透之道☆29Dec 13, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Apr 5, 2026Updated last week
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆558May 9, 2023Updated 2 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Emacs: incremental search for the kill ring☆13Apr 22, 2014Updated 11 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- remoteStorage server implementation as a django app☆27Feb 11, 2020Updated 6 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- 获取腾讯企业邮箱通讯录☆54Oct 11, 2017Updated 8 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- 复现Django 漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- A bash script for color switching, maybe more.☆10Jan 6, 2022Updated 4 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Jan 10, 2018Updated 8 years ago
- Golang 判断 Web 页面相似度(XML/Json/HTML/RawText)☆10Feb 19, 2019Updated 7 years ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆15Mar 18, 2025Updated last year
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Apr 22, 2018Updated 7 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- Local Maltego Transforms for crt.sh☆12Sep 8, 2017Updated 8 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- A heatmap vizualization of bucketed ranged data over time.☆22Apr 1, 2013Updated 13 years ago
- A set of tools and procedures for automating NSM and NIDS deployments in AWS☆15Oct 16, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago
- PW3Query is a serverless query agent and repository for PublicWWW with a focus on proactively generating threat intelligence related to w…☆20Jul 25, 2019Updated 6 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Cloak files using text based steganography output to obsfucate what data they contain. Coded in Powershell. This is a port of TryCatchH…☆44Feb 6, 2021Updated 5 years ago
- TCP reset attack implementation in Go☆21Mar 10, 2019Updated 7 years ago
- Sys Mon! Why yu nuh logging dat?☆12Dec 10, 2018Updated 7 years ago
- ☆18Aug 31, 2021Updated 4 years ago