ecstatic-nobel / Aisle25Links
Detect leaks in security event logs.
☆20Updated 6 years ago
Alternatives and similar repositories for Aisle25
Users that are interested in Aisle25 are comparing it to the libraries listed below
Sorting:
- Pentest ToolKit☆28Updated 5 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 12 years ago
- A SIEM inspired by HECTOR, built on Django.☆29Updated 6 years ago
- intrusion detection☆24Updated 8 years ago
- ☆33Updated 5 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆53Updated 7 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- A curated list of awesome infosec resources.☆28Updated 10 years ago
- HoneyDB Python Module☆13Updated last year
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 11 months ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- ☆14Updated 7 years ago
- ☆21Updated 2 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated 3 months ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- devops scripts☆33Updated 8 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Wireless Forensics Framework In Python☆20Updated 8 years ago