Python Module for creating Log Event Extended Format events for IBM QRadar
☆12Jun 4, 2016Updated 9 years ago
Alternatives and similar repositories for python-LEEF
Users that are interested in python-LEEF are comparing it to the libraries listed below
Sorting:
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- Samples of visualization add-ons to QRadar, utilizing public REST APIs☆33May 17, 2016Updated 9 years ago
- QRadar Export the rule set for printing☆23Oct 23, 2017Updated 8 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated 3 weeks ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- ☆10Sep 10, 2025Updated 5 months ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Nov 24, 2014Updated 11 years ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- gcnano-binaries☆11Feb 9, 2026Updated 2 weeks ago
- Useful scripts that I create in my free time to benefit the open source community.☆12Dec 14, 2019Updated 6 years ago
- a library of Logstash pipeline configuration files mapping data to the Elastic Common Schema☆10Feb 28, 2021Updated 4 years ago
- Python library for Alphanov's PDM laser sources control☆13Updated this week
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- ☆10Feb 4, 2024Updated 2 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- ☆11Jul 10, 2019Updated 6 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Automate scans using Qualys SSL Labs☆19Mar 10, 2020Updated 5 years ago
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago
- DNS Amplification IPTABLES block lists and Rules against DNS Attacks☆11Oct 25, 2016Updated 9 years ago
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- ChipJabber-Unplugged does new-school attacks with old-school logic.☆14Sep 16, 2020Updated 5 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 9 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- Tabulate is a command-line tool to convert record type data (e.g. CSV files) into a pretty printed table.☆16Mar 1, 2020Updated 5 years ago
- sysvinit booting scripts replacement for Pardus☆21Dec 1, 2011Updated 14 years ago
- GOST-34.11-2012 (Stribog) hash-function☆11May 12, 2015Updated 10 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Bash script that deploys virtual proxies which route traffic through OpenVPN and Tor tunnels.☆10Jul 29, 2019Updated 6 years ago
- Ghidra Loader for ESP32 Flash Dumps☆15Feb 10, 2025Updated last year
- Technical reports and preprints☆14Jul 30, 2016Updated 9 years ago
- Top DNS Measurement for Bro☆11Aug 22, 2020Updated 5 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- Some terrible features you can add to Python☆12Jan 27, 2019Updated 7 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- A small script to import and ban IPs from a list (like from blocklist.de)☆14Oct 23, 2016Updated 9 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago