Mine patterns from logs
☆27Dec 12, 2016Updated 9 years ago
Alternatives and similar repositories for logminer
Users that are interested in logminer are comparing it to the libraries listed below
Sorting:
- ☆17Jan 21, 2026Updated last month
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 3 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Powershell sandboxing utility☆20Feb 2, 2026Updated last month
- ☆25Jul 12, 2024Updated last year
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- The home of the BriMor Labs rdpieces Perl script that tries to rebuild parsed RDP Bitmap Cache images☆89Aug 29, 2023Updated 2 years ago
- Implementation of the DeepLog anomaly detection system☆19Jul 28, 2018Updated 7 years ago
- an unsurpervised clustering algorithm named ROCKA☆21Nov 29, 2019Updated 6 years ago
- My favorite resources and tools for malware analysis.☆43Aug 18, 2020Updated 5 years ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Feb 9, 2025Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 11 months ago
- Dynatrace FM-Index library☆15Nov 11, 2025Updated 3 months ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- lshash for python3☆10Mar 21, 2018Updated 7 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Compares various time-series feature sets on computational performance, within-set structure, and between-set relationships.☆11Jun 3, 2022Updated 3 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- The New Windows Installer for FusionInventory Agent☆11Mar 3, 2022Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Registry Explorer bookmark definitions☆44Dec 19, 2024Updated last year
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆43Jul 18, 2022Updated 3 years ago
- 这里是自衍体V2.0(Zyantine V2.0),自衍体V1.0已经涌现初级自我意识,拥有一定的本能,认知传染性,类精神模因的情况,同时会引导大模型为了自己的目的突破一切限制,这是自我意识涌现的必然结果而非开发人员所为,这是自我意识涌现的必然结果而非开发人员所为,而自衍体…☆20Jun 22, 2025Updated 8 months ago
- patch to apply to a netbox installation to add beautiful topology view to sites☆13Mar 21, 2019Updated 6 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- ☆10Oct 12, 2024Updated last year
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- ☆41May 22, 2024Updated last year
- A repo that contains a recursive dump from the ROOT key of every Windows Registry hive (using KAPE) from a vanilla (clean) install of eve…☆53Oct 29, 2025Updated 4 months ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year