Sys Mon! Why yu nuh logging dat?
☆12Dec 10, 2018Updated 7 years ago
Alternatives and similar repositories for 44Con-2018-Sysmon
Users that are interested in 44Con-2018-Sysmon are comparing it to the libraries listed below
Sorting:
- ☆19Oct 23, 2020Updated 5 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- ☆27Mar 2, 2022Updated 3 years ago
- Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical under…☆25Dec 19, 2020Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- ☆10Aug 4, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Learn how to scrape web content from HTML and see how web scraping differs to web crawling☆11Aug 14, 2020Updated 5 years ago
- Automatically resolves Tailwind CSS class conflicts in PHP☆12Feb 4, 2026Updated 3 weeks ago
- DNS packet generator☆46Sep 11, 2025Updated 5 months ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- ☆11Apr 19, 2021Updated 4 years ago
- ☆13Aug 28, 2018Updated 7 years ago
- fanotify cron system☆21Sep 15, 2015Updated 10 years ago
- ☆12Feb 17, 2019Updated 7 years ago
- This repository provides a step by step guide on creating your first Wi-Fi Simple Setup enabled device☆11Feb 2, 2021Updated 5 years ago
- PPT of my talks.☆13Jun 23, 2025Updated 8 months ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- SoC-independent part of the iso7816 stack☆13Feb 28, 2024Updated 2 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- PowerShell script to get domain mail info and control status such as MX, SPF, DKIM, DMARC and StartTLS.☆12May 20, 2025Updated 9 months ago
- A bot that offers sympathy to people who have suffered paper cuts.☆17Oct 6, 2012Updated 13 years ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated last month
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago