A SIEM inspired by HECTOR, built on Django.
☆27Apr 16, 2019Updated 7 years ago
Alternatives and similar repositories for nector
Users that are interested in nector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Very basic CLI SIEM (Security Information and Event Management system).☆41Mar 24, 2018Updated 8 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- CyberCrowl is a python Web path scanner tool☆25Feb 5, 2019Updated 7 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Asynchronous HTTP pipelining directory buster☆24Jul 28, 2020Updated 5 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- Gather and compile open source threat intelligence feeds.☆39Feb 19, 2022Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- This repository bundles various utilities and scripts I built for use with IBM QRadar SIEM☆16Jan 30, 2026Updated 3 months ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆447Nov 30, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Moved to https://codeberg.org/DNS-OARC/cmdns-cli☆25Feb 4, 2026Updated 3 months ago
- Collecting, processing and presenting information about WiFi access points and their geolocation. A versatile wardriving command center.☆15Mar 16, 2026Updated 2 months ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Continuously record video in small clips. Dashcam-style mobile app.☆12Apr 3, 2023Updated 3 years ago
- Generic cracker example which is compatible with Hashtopolis☆23May 18, 2021Updated 5 years ago
- Android Keyboard which transforms simple letters into special characters | Dodge censorship!! - your words, your way!☆17Jan 17, 2024Updated 2 years ago
- [DEPRECATED] SIP Swiss army knife☆19Oct 25, 2019Updated 6 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.3☆12Jan 23, 2020Updated 6 years ago
- SIAC is an enterprise SIEM built on open-source technology.☆114Oct 31, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- ActiveRecord patch for Flask-SQLAlchemy models☆15Apr 10, 2018Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Simple ESP32-Based WiFi Wardriving Device☆23Mar 26, 2025Updated last year
- Telegram bot utilizing OpenAI's GPT to generate presentations and abstracts in PPTX and DOCX formats.☆10Jan 10, 2024Updated 2 years ago
- My old BASH dot-files... Try new one!☆14Aug 17, 2017Updated 8 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 12 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- OSINT tool for Instagram☆15Feb 19, 2019Updated 7 years ago
- ☆10Mar 3, 2023Updated 3 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- ☆47Jun 3, 2020Updated 5 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 4 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Jan 5, 2022Updated 4 years ago