degenerat3 / SawmillLinks
ELK stack for red team logs
☆12Updated 4 years ago
Alternatives and similar repositories for Sawmill
Users that are interested in Sawmill are comparing it to the libraries listed below
Sorting:
- autopwn + deployment☆15Updated 3 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- RITSEC Weekly Labs☆11Updated 6 years ago
- Protect your servers with a secret header☆29Updated 5 years ago
- ☆28Updated 7 years ago
- ☆25Updated 4 years ago
- Walking the PEB in VBA☆24Updated 5 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆22Updated 4 years ago
- ☆38Updated 5 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- Deploy redteam infrastructure☆16Updated 4 years ago
- ☆17Updated 6 years ago
- DLL Injector as a service that watches the health of the started thread.☆9Updated 5 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆30Updated 2 years ago
- Automated deployment and configuration of a Mythic server using Terraform and Ansible☆9Updated 2 years ago
- extracts shellcode from a nasm compile macho binary☆16Updated 4 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- Custom SOCKS proxy for redteam☆12Updated 3 years ago
- ☆27Updated 5 years ago
- C2 over web☆8Updated 5 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 5 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- ☆70Updated 6 years ago
- ☆16Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago