SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab
☆37Aug 26, 2020Updated 5 years ago
Alternatives and similar repositories for siem-from-scratch
Users that are interested in siem-from-scratch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16May 20, 2022Updated 3 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated 2 years ago
- fast, zero config web endpoint change monitor☆43Aug 4, 2020Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ☆13Jan 12, 2022Updated 4 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- ☆60Aug 30, 2021Updated 4 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆20Jul 9, 2019Updated 6 years ago
- Outlook persistence using VSTO add-ins☆87Jan 9, 2021Updated 5 years ago
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆113Aug 5, 2020Updated 5 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Validate proxies for specific domain☆39Aug 14, 2021Updated 4 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- A Python client for the Global CVE Allocation System.☆18Mar 26, 2026Updated 2 weeks ago
- ☆19Oct 2, 2022Updated 3 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Ansible Playbook to install the ELK Stack☆44Aug 6, 2020Updated 5 years ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 2 months ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security communit…☆28Dec 17, 2025Updated 3 months ago
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆120Jul 23, 2023Updated 2 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago