Open Source Security Information and event Management
☆111Sep 26, 2015Updated 10 years ago
Alternatives and similar repositories for ossim
Users that are interested in ossim are comparing it to the libraries listed below
Sorting:
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- 针对 markdown 文件的命令行翻译☆14Feb 2, 2023Updated 3 years ago
- A CLI for Larder.io☆20Jul 31, 2020Updated 5 years ago
- Statistics parsing for suricata☆18Nov 14, 2013Updated 12 years ago
- ☆23Aug 3, 2016Updated 9 years ago
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Tools and script for my remnux/sift installation☆23Feb 21, 2026Updated 2 weeks ago
- Weaponized PoC for SMBv3 TCP codec/compression vulnerability☆19Apr 1, 2020Updated 5 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Jun 13, 2019Updated 6 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- ☆12Jun 9, 2021Updated 4 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- For Implementing CIS Controls in Different Operating Systems☆13Aug 2, 2019Updated 6 years ago
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 6 years ago
- Documentation of FusionInventory☆10Oct 24, 2023Updated 2 years ago
- ☆10Nov 19, 2015Updated 10 years ago
- This is a tool installer for hackers☆11Aug 7, 2020Updated 5 years ago
- ☆13Jul 29, 2025Updated 7 months ago
- Minimal C port of UTF8-CPP☆12Jun 2, 2019Updated 6 years ago
- A clone of FD (File & Directory tool) by T.Shirai☆16Jan 29, 2014Updated 12 years ago
- Conditional Access baseline for March 2025☆12Mar 4, 2025Updated last year
- 🇬🇧 The list of useful resources for self-study☆26Feb 16, 2023Updated 3 years ago
- Node.js library for sending message through Whatsapp Business API☆11Apr 24, 2021Updated 4 years ago
- Collection of bash scripts and Ansible playbooks.☆11Updated this week
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- Chef Cookbook which provisions apache+mod_security+owasp-crs☆37Jun 20, 2018Updated 7 years ago
- Experimental linux kernel module to mirror evdev inputs☆16Aug 1, 2020Updated 5 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- Windows Virtual Desktop (WVD) - resources and scripts for easy use☆12Dec 11, 2020Updated 5 years ago