A SIEM inspired by HECTOR, built on Django.
☆27Apr 16, 2019Updated 6 years ago
Alternatives and similar repositories for nector
Users that are interested in nector are comparing it to the libraries listed below
Sorting:
- Very basic CLI SIEM (Security Information and Event Management system).☆40Mar 24, 2018Updated 7 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- Fork of famous packet sniffer suite☆13Dec 12, 2011Updated 14 years ago
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- [DEPRECATED] SIP Swiss army knife☆19Oct 25, 2019Updated 6 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Generic cracker example which is compatible with Hashtopolis☆23May 18, 2021Updated 4 years ago
- Gather and compile open source threat intelligence feeds.☆40Feb 19, 2022Updated 4 years ago
- This repository bundles various utilities and scripts I built for use with IBM QRadar SIEM☆16Jan 30, 2026Updated last month
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Dec 1, 2016Updated 9 years ago
- Viper is a brute-force password cracker.☆24Feb 10, 2016Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Moved to https://codeberg.org/DNS-OARC/cmdns-cli☆24Feb 4, 2026Updated 3 weeks ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Install a full Splunk Enterprise Cluster or Universal forwarder using an ansible playbook☆54May 24, 2020Updated 5 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Curated list of awesome cybersecurity companies and solutions.☆160Jun 7, 2024Updated last year
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆28Jul 30, 2024Updated last year
- Example Python and R code for Cloudera Machine Learning (CML) training☆14Dec 1, 2020Updated 5 years ago
- bro on debian with elasticsearch support☆24Mar 27, 2017Updated 8 years ago
- SIAC is an enterprise SIEM built on open-source technology.☆113Oct 31, 2018Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- Stupid MQTT Brute Forcer☆32Jul 27, 2017Updated 8 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated 2 weeks ago
- open-source intelligence gathering for SIEMs <3☆37Feb 16, 2017Updated 9 years ago
- PCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 7 - Ansible role generated from ComplianceAsCode Project☆28Oct 30, 2025Updated 4 months ago
- A Hubot instance that's here to protect you.☆11Jun 20, 2025Updated 8 months ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Sep 18, 2024Updated last year
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆85May 10, 2018Updated 7 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago