☆12Jun 4, 2025Updated 9 months ago
Alternatives and similar repositories for Blue-DVWA-Splunk
Users that are interested in Blue-DVWA-Splunk are comparing it to the libraries listed below
Sorting:
- A high-interaction virtual honeypot for ICS that provides physical process simulation☆20May 10, 2024Updated last year
- Red Teaming Tradecraft☆30Sep 28, 2022Updated 3 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 22, 2026Updated last week
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- ☆16Jul 8, 2024Updated last year
- ☆12Jul 4, 2024Updated last year
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆44Jun 12, 2024Updated last year
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 5 months ago
- ☆12Feb 7, 2023Updated 3 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- ☆13Jun 15, 2023Updated 2 years ago
- ☆10Aug 9, 2024Updated last year
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆12Oct 15, 2024Updated last year
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- ☆14Dec 24, 2025Updated 2 months ago
- ☆11Oct 25, 2021Updated 4 years ago
- MCP wrapper for Hashcat – automate hash cracking with natural language☆24Jun 5, 2025Updated 9 months ago
- A web frontend for tesseract-ocr☆11Aug 4, 2023Updated 2 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- Automation for NPM reverse proxy manager☆13Feb 17, 2025Updated last year
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Jun 23, 2021Updated 4 years ago
- MalBox is a quick and dirty setup to create a malware analysis VM☆14Aug 27, 2024Updated last year
- Provides a chat-based, LLM-assisted reverse engineering experience within Ghidra☆33Nov 23, 2025Updated 3 months ago
- Cheat Sheet for IEC 104☆20May 23, 2022Updated 3 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 5 months ago
- Automated security investigation tool using Microsoft MCP Servers, GitHub Copilot, Python Modules and custom copilot-instructions.☆48Updated this week
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last week
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆24Feb 24, 2026Updated last week
- Various scripts I've built for CTFs, hacking challenges, and for learning how various existing tools work☆17Mar 21, 2023Updated 2 years ago