☆33Jun 27, 2022Updated 3 years ago
Alternatives and similar repositories for securityonion-cloud
Users that are interested in securityonion-cloud are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Notes for High Availability MISP in AWS☆19Nov 6, 2019Updated 6 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 5 years ago
- Docker files for Security Onion☆42Jan 28, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Scripts to demonstrate VPC Service Controls between tenant and shared projects☆12Jun 11, 2019Updated 6 years ago
- Sentinel BEC IR☆14Aug 18, 2022Updated 3 years ago
- ☆14Feb 22, 2021Updated 5 years ago
- ☆95Apr 1, 2026Updated 2 weeks ago
- A reimplementation of the EtherApe style display for OS X. Note that this is not a fork of EtherApe. Written in a kinder, gentler, age …☆21Dec 3, 2018Updated 7 years ago
- ☆15Mar 12, 2025Updated last year
- ☆54Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Purple Teaming Attack & Hunt Lab - Terraform☆162Nov 29, 2021Updated 4 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- This repo hosts links to blogs, documentation and assets referenced by the Security Guide Blog.☆12Apr 1, 2026Updated 2 weeks ago
- ☆11Nov 13, 2024Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆25Aug 1, 2022Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 8 months ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Create a MS Word index file from PowerPoint notes and slides☆46Sep 6, 2025Updated 7 months ago
- Collection of reusable references☆14Jan 1, 2026Updated 3 months ago
- Minimalistic WebUI for passiveDNS tool☆18May 6, 2021Updated 4 years ago
- Common Continuous Integration Team Scenarios: Text Version☆11Aug 9, 2020Updated 5 years ago
- ☆21Aug 31, 2022Updated 3 years ago
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- Scrapes information on vulnerabilities from US-CERT and parses them for further usage☆17Jun 23, 2020Updated 5 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- ☆12Jun 24, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆14Jan 18, 2019Updated 7 years ago
- ☆23Nov 13, 2014Updated 11 years ago
- ☆19Apr 5, 2026Updated last week
- Linux Device Drivers 3 examples updated to work in recent kernels☆25May 6, 2012Updated 13 years ago
- Python wrapper for FileLocator Pro Searches☆12Feb 17, 2020Updated 6 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆64Mar 30, 2026Updated 2 weeks ago
- A suite of cybersecurity tools designed to allow for rapid deployment of virtualized environments. Intended for use in education: contain…☆15Nov 11, 2019Updated 6 years ago