Very basic CLI SIEM (Security Information and Event Management system).
☆39Mar 24, 2018Updated 8 years ago
Alternatives and similar repositories for siemstress
Users that are interested in siemstress are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A SIEM inspired by HECTOR, built on Django.☆27Apr 16, 2019Updated 6 years ago
- Open Source SIEM (Security Information and Event Management system).☆219Aug 24, 2023Updated 2 years ago
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- Sneak is URL transfer tool based on Tor and Curl.☆14Dec 6, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A commercial grade threat intelligence feed thats validated and updated every half hour.☆19Mar 24, 2023Updated 3 years ago
- Curated list of awesome cybersecurity companies and solutions.☆160Jun 7, 2024Updated last year
- ☆47May 4, 2017Updated 8 years ago
- A tool for running an application in an isolated network namespace, with external network access only through a SOCKS proxy.☆27Nov 8, 2024Updated last year
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- Digital Forensics Artifacts Knowledge Base☆90Dec 23, 2025Updated 3 months ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Jul 8, 2019Updated 6 years ago
- Digital Forensics Windows Registry (dfWinReg)☆54Dec 22, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Test suite to validate and demonstrate use cases.☆18Mar 18, 2026Updated last week
- CS Aim Assist☆21Oct 24, 2022Updated 3 years ago
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆31May 7, 2024Updated last year
- Dashboards and loader for ROCK NSM dashboards☆49Mar 13, 2023Updated 3 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- DO NOT USE: this is a vulnerable ASP.NET web app using Razor templating engine. The vulnerability is a Server-Side Template Injection (SS…☆28Aug 22, 2020Updated 5 years ago
- SIAC is an enterprise SIEM built on open-source technology.☆113Oct 31, 2018Updated 7 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 3 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Just random powershell things I've put together.☆37May 7, 2025Updated 10 months ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- Fork of famous packet sniffer suite☆13Dec 12, 2011Updated 14 years ago
- PowerShell based network attached device monitor☆11Sep 3, 2024Updated last year
- [DEPRECATED] SIP Swiss army knife☆19Oct 25, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Scripts used to create ISO installers of ROCK for offline installation.☆10Mar 13, 2023Updated 3 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- ☆19Apr 29, 2019Updated 6 years ago
- Best practices in threat intelligence☆50Nov 6, 2022Updated 3 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Dec 20, 2019Updated 6 years ago
- This tweaks the motd do be much cooler☆12May 15, 2017Updated 8 years ago
- Scan and edit memory using WinAPI functions such as ReadProcessMemory and WriteProcessMemory☆50Sep 25, 2017Updated 8 years ago