ecstatic-nobel / Aisle25
Detect leaks in security event logs.
☆19Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Aisle25
- Pentest ToolKit☆27Updated 4 years ago
- A curated list of awesome infosec resources.☆24Updated 9 years ago
- DPE - Default Password Enumeration☆32Updated 11 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆52Updated 6 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆16Updated 9 years ago
- recon-ng Maltego local transform pack☆38Updated 10 years ago
- ☆12Updated 6 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆65Updated last year
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆55Updated 9 years ago
- ☆34Updated 6 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago
- devops scripts☆30Updated 7 years ago
- intrusion detection☆23Updated 7 years ago
- A Python DNS crawler to find identical domain names under different TLDs.☆24Updated 5 years ago
- Following repository contains source codes used in my two Books.☆10Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Maltego transform for visualizing Nessus scan data☆45Updated 4 years ago
- Rapid7's Nexpose Maltego Transform Pack☆23Updated 11 years ago
- ☆29Updated 6 years ago
- ☆21Updated last year
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated 5 months ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆52Updated 3 years ago
- OSINT tool to evaluate the trustworthiness of a company☆40Updated 4 years ago