DNS Dashboard for hunting and identifying beaconing
☆16Jul 29, 2020Updated 5 years ago
Alternatives and similar repositories for Dashboards-Splunk-DNS-Hunting-Beaconing
Users that are interested in Dashboards-Splunk-DNS-Hunting-Beaconing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Oct 12, 2020Updated 5 years ago
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Sep 5, 2020Updated 5 years ago
- Powershell - web traffic whitenoise generator☆47Jun 4, 2020Updated 5 years ago
- ☆14Jan 2, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Sep 27, 2022Updated 3 years ago
- Detect and defend against the nonce race exploit on Polymarket's CTF Exchange☆28Mar 17, 2026Updated last week
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- Get 10k subdomains in securitytrails using cookie without apikey.☆37Oct 23, 2025Updated 5 months ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆32Jul 30, 2020Updated 5 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- This repository contains Splunk queries to hunt some anomalies☆46Jul 28, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- a simple API to retrieve a process tree☆30Mar 4, 2025Updated last year
- Broctl plugin for automatically executing 'setcap' on each node after an install☆13Dec 18, 2020Updated 5 years ago
- Allows viewing of nightscout CGM data in the chrome extension bar.☆15Sep 15, 2022Updated 3 years ago
- Extension for MainWP Dashboard. Checks the child websites plugins for vulnerability using the WordFence intelligence api.☆11Oct 17, 2024Updated last year
- ☆37Aug 23, 2022Updated 3 years ago
- All CVE - PoC in GitHub☆13Mar 22, 2024Updated 2 years ago
- 🗄️💧 Find exposed and unsecured databases from a list of hosts. 🗄️💧☆15Jul 1, 2021Updated 4 years ago
- Bienvenue sur le dépôt GitHub de Hacking-France, le site dédié à la communauté de hacking éthique francophone. Ce projet vise à rassemble…☆12Updated this week
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆31Dec 18, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆12Jan 5, 2021Updated 5 years ago
- Code repository for Hands-on PowerShell for Active Directory, Published By Packt☆14Jan 30, 2023Updated 3 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- line based tcp load balancing proxy.☆14Jun 18, 2024Updated last year
- ☆29Jan 9, 2025Updated last year
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- Load various payload (DLL from memory, Exe, etc...) in a way to evade static analysis of Antivirus. It can fetch data from various method…