Install and configure user mode auditd tools
☆34Feb 17, 2026Updated 2 weeks ago
Alternatives and similar repositories for auditd
Users that are interested in auditd are comparing it to the libraries listed below
Sorting:
- Splunk csv to KVStore ES Threat Intel☆11Jul 11, 2016Updated 9 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- Official documentation for TheHive Project applications☆21Sep 29, 2023Updated 2 years ago
- Look into EDR events from network☆25Nov 20, 2025Updated 3 months ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- USA based Information Security & I.T. Conferences☆32Aug 5, 2022Updated 3 years ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-…☆13Dec 17, 2021Updated 4 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- A terraform module to deploy Vault as per the reference architecture☆14Mar 19, 2019Updated 6 years ago
- Zeek support for Community ID flow hashing.☆36Jul 11, 2023Updated 2 years ago
- Cookiecutter template for creating Ansible roles. Includes tests for TravisCI using Molecule.☆13Dec 14, 2021Updated 4 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Postfix Add-on for Splunk (Compliant with the Mail CIM model)☆11Mar 18, 2021Updated 4 years ago
- Amlogic G12A Mali support for Mali Bifrost based SoCs, for Mainline Linux only☆11Jan 28, 2023Updated 3 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- A python program to interact with the AVHzY CT-2 power meter https://store.avhzy.com/index.php?route=product/product&product_id=50☆11Apr 5, 2019Updated 6 years ago
- ☆12Jan 9, 2018Updated 8 years ago
- Client for the Webkit Remote Debugging server☆17Dec 28, 2018Updated 7 years ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- A simple method for abstract hash visualization☆14Jul 28, 2018Updated 7 years ago
- An Ansible role to install and configure the ZNC IRC bouncer server.☆10Aug 4, 2019Updated 6 years ago
- Python wrapper for remote-viewer, easy connection to SPICE-enabled VMs and CTs, running in Proxmox VE☆11Aug 2, 2021Updated 4 years ago
- This is a personal script used to link Kali Nethunter Chroot/Termux to the Proxmark3 and small patch for DriveDroid on Android 12.☆11Jan 24, 2022Updated 4 years ago
- Widgets JSON for OpenBB Terminal Pro☆15Aug 30, 2024Updated last year
- Like `extend` but only copies missing properties/values to the target object.☆17Apr 26, 2017Updated 8 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- OAI Network Service in OSM☆12Sep 13, 2025Updated 5 months ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- Data Governance app for Splunk☆12Oct 19, 2023Updated 2 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago