☆32May 14, 2018Updated 7 years ago
Alternatives and similar repositories for CheatSheets
Users that are interested in CheatSheets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Apr 16, 2017Updated 8 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- ☆16Mar 10, 2026Updated 2 weeks ago
- A Splunk app that transforms varies Splunk generated metrics values into a metrics store☆11Apr 10, 2018Updated 7 years ago
- Run Splunk heavy forwarders in Docker Swarm for high availability, security, and reduced cost!☆15Aug 19, 2025Updated 7 months ago
- ☆22Sep 16, 2025Updated 6 months ago
- ☆18Jul 3, 2018Updated 7 years ago
- AWS Quick Start Team☆40Oct 3, 2024Updated last year
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- ☆14Apr 29, 2020Updated 5 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Apr 24, 2018Updated 7 years ago
- ☆27Dec 6, 2013Updated 12 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Splunk AWS Serverless applications and Lambda blueprints☆59Oct 31, 2024Updated last year
- Investigating attacks using Splunk Enterprise logs and creating SPL intrusion detection searches based on known attacker TTPs and anomaly…☆29Nov 19, 2023Updated 2 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- ☆68Oct 17, 2022Updated 3 years ago
- Pure-Rust DTLS☆12Nov 12, 2022Updated 3 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago
- A website for monitoring web applications☆45Oct 28, 2024Updated last year
- Exploit for win10 SMB3.1☆18Apr 5, 2020Updated 5 years ago
- ☆72Oct 21, 2024Updated last year
- A Python port of the R implementation of Kleinberg's burst detection algorithm☆12Apr 11, 2022Updated 3 years ago
- Repo for MGraph project☆13Jan 10, 2026Updated 2 months ago
- KERnano: The No-install Python Pen Testing kit. (Windows & Linux)☆13Sep 2, 2022Updated 3 years ago
- Heart-shaped flashlight PCB for Ariella☆14Sep 2, 2017Updated 8 years ago
- collectd☆11Feb 3, 2020Updated 6 years ago
- This app leverages the Adaptive Response framework to perform API calls to Security Trails☆15Feb 14, 2019Updated 7 years ago
- SPL cheatsheet for Splunk.☆26Dec 2, 2022Updated 3 years ago
- Bulk modify Splunk Knowledge Object's owners, permissions, apps, sharing and move them to another app☆26Aug 27, 2022Updated 3 years ago
- IP geolocation for authentication events with MozDef☆10Apr 29, 2019Updated 6 years ago
- A MCP (Model Context Protocol) client that uses Google Gemini AI models for intelligent tool usage and conversation handling. Tested wor…☆19May 27, 2025Updated 9 months ago
- SAML2 Burp Extension☆33Feb 24, 2026Updated last month
- Framework that sits on top of Splunk Enterprise Security to do auto-mitigation☆14Dec 29, 2014Updated 11 years ago
- ☆28Mar 29, 2024Updated last year
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year