SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab
☆37Aug 26, 2020Updated 5 years ago
Alternatives and similar repositories for siem-from-scratch
Users that are interested in siem-from-scratch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16May 20, 2022Updated 3 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated 2 years ago
- fast, zero config web endpoint change monitor☆43Aug 4, 2020Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- ☆21Jul 9, 2019Updated 6 years ago
- Outlook persistence using VSTO add-ins☆87Jan 9, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆113Aug 5, 2020Updated 5 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Validate proxies for specific domain☆39Aug 14, 2021Updated 4 years ago
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Monitors the network for new connected MAC addresses☆17Dec 10, 2022Updated 3 years ago
- A Python client for the Global CVE Allocation System.☆18Mar 26, 2026Updated last month
- ☆19Oct 2, 2022Updated 3 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- Ansible Playbook to install the ELK Stack☆44Aug 6, 2020Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 5 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago