Collection of scripts, files, and tips to create and maintain networks, hack, and more!
☆75Jun 13, 2021Updated 4 years ago
Alternatives and similar repositories for CheatSheets
Users that are interested in CheatSheets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Sep 5, 2020Updated 5 years ago
- Cheatsheets and other Yealink Phone information.☆17Apr 13, 2018Updated 7 years ago
- Collections of way to evade normal detection events.☆23Sep 13, 2020Updated 5 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- ☆30May 1, 2025Updated 10 months ago
- Documentation for Zeek☆50Oct 13, 2025Updated 5 months ago
- A collection of plugin extensions for netbox, including generic wrappers around NetBox objects☆17Apr 11, 2022Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- ☆14Jan 2, 2025Updated last year
- ☆55Mar 2, 2022Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆19Mar 27, 2019Updated 6 years ago
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- The Admin Assistant allows Splunk admins to monitor data ingestion and onboarding, RBAC config, user onboarding, and more! Dashboard pane…☆10Feb 27, 2022Updated 4 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Nov 26, 2025Updated 3 months ago
- Our collection of Wazuh detection rules for our Offense Lab☆18Feb 13, 2022Updated 4 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- This is a place for various teamplates and automation resources for Cisco Secure Firewall☆40Sep 30, 2025Updated 5 months ago
- Collect SIEM logs from the Mimecast API using Python. Currently supports multiple endpoints. Use this to be able to easily and quickly fo…☆11Apr 4, 2024Updated last year
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- Script to backup pfSense configuration and statistics☆45Mar 21, 2017Updated 9 years ago
- Uses an AI create a good prompt to generate logo's using DALL-E. I made this for FourweekMBA so they have all the rights to the code. Ple…☆18Apr 1, 2023Updated 2 years ago
- 🎒 Everything I need to set up camp☆13Mar 16, 2026Updated last week
- Documentation of vmc☆16Mar 4, 2025Updated last year
- Netbox Scripts☆23Dec 31, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- Simple tool to monitor network changes over time and trigger alerts☆15Mar 11, 2020Updated 6 years ago
- Gets a list of closest lime scooters to a location, or notifies you if one is close☆13May 2, 2023Updated 2 years ago
- ☆12May 19, 2025Updated 10 months ago
- Multiple remote computer commands in an easy to use tool.☆18Nov 10, 2020Updated 5 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- IMAP or SMTP honeypot written in Golang☆26Apr 22, 2022Updated 3 years ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 10 years ago
- Here you'll find code for your DigiSpark. Download this Repository for awesome pranks that you can use on your friends!☆10Oct 15, 2020Updated 5 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆15May 29, 2020Updated 5 years ago
- Awesome Cyber-Security Data-sets Collection☆22Aug 30, 2018Updated 7 years ago
- Hacks for my Unifi Dream Machine (UDM) Pro☆29Jul 6, 2024Updated last year
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago