SPL for aws datasets
☆14Jul 9, 2025Updated 7 months ago
Alternatives and similar repositories for SPL
Users that are interested in SPL are comparing it to the libraries listed below
Sorting:
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆42Jun 27, 2021Updated 4 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- A package that get baseball data☆13Feb 24, 2025Updated last year
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 8 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Feb 11, 2026Updated 3 weeks ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- 🐧 Security-focused Linux distribution with 140+ tools, custom kernel 6.17.13, AI assistant | 5 editions | Cloud, AI/ML, Automotive, Hard…☆29Feb 27, 2026Updated last week
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 4 months ago
- ☆13Dec 14, 2021Updated 4 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- LLM supported Toolkit for Blue Team/ SOC Operations☆46Jan 10, 2026Updated last month
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- Introduction to Encryption☆13Jul 28, 2025Updated 7 months ago
- ☆10Jan 22, 2025Updated last year
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- Microsoft Defender for Cloud attack simulation toolkit☆26Dec 24, 2024Updated last year
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- ☆11Nov 8, 2023Updated 2 years ago
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Oct 3, 2023Updated 2 years ago
- ☆11Dec 9, 2025Updated 2 months ago
- Save as PDF addon for Firefox and Google Chrome☆15Jun 12, 2025Updated 8 months ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- This repository contains code, manuals and notes I wrote pertaining to system programming on Linux☆12Jun 8, 2023Updated 2 years ago
- A collection of cyberchef recipes for use in osint investigations☆14Jul 2, 2022Updated 3 years ago
- /ˈhäjˌpäj/ "a confused mixture."☆13Feb 26, 2026Updated last week
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- bypass SSL Pining ( Andriod emulator & burpsuite with frida)☆18Nov 10, 2022Updated 3 years ago
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- ☆10Mar 29, 2022Updated 3 years ago
- This website is a collection of the best digital piracy resources. This will help you get started on your pirate voyage.☆12Dec 12, 2021Updated 4 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- This batch script reveal all Wi-Fi passwords saved in your computer.☆17Apr 10, 2022Updated 3 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago