☆32May 14, 2018Updated 7 years ago
Alternatives and similar repositories for CheatSheets
Users that are interested in CheatSheets are comparing it to the libraries listed below
Sorting:
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Feb 19, 2026Updated last week
- ☆16Apr 16, 2017Updated 8 years ago
- ☆22Sep 16, 2025Updated 5 months ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆18Jul 24, 2022Updated 3 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- fqdn_parser (Fully Qualified Domain Name Parser) is a library for parsing FQDNs into their component parts, as well as providing addition…☆28Jul 20, 2024Updated last year
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 3 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- ☆68Oct 17, 2022Updated 3 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Apr 24, 2018Updated 7 years ago
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 5 months ago
- ☆72Oct 21, 2024Updated last year
- Turn any blog into structured threat intelligence.☆52Updated this week
- Visualize your Terraform files☆34Sep 9, 2020Updated 5 years ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆80Jan 6, 2026Updated last month
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- AWS Quick Start Team☆40Oct 3, 2024Updated last year
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- ☆12Feb 16, 2023Updated 3 years ago
- A Splunker’s guide to containers☆12Dec 21, 2019Updated 6 years ago
- Additional README's for XSOAR and XSOAR related things☆14Oct 4, 2023Updated 2 years ago
- ☆10May 8, 2018Updated 7 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 2 months ago
- Artificial Dog to bark at deer and other garden pests using Raspberry Pi and Groundlight☆12Jun 19, 2024Updated last year
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- ☆44Jul 11, 2025Updated 7 months ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- 🦈 Prometheus exporter for pcap metrics☆16Feb 15, 2023Updated 3 years ago