β25Dec 10, 2018Updated 7 years ago
Alternatives and similar repositories for aws-logsearch
Users that are interested in aws-logsearch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DevSecOps command line asset inventory toolβ30Oct 2, 2023Updated 2 years ago
- Chrome extension that exposes pixel trackers in your email and retaliate π€β22Jun 14, 2023Updated 2 years ago
- Run commands or shell under an AWS IAM roleβ28Oct 13, 2023Updated 2 years ago
- Mac osx forensics toolsβ12Nov 28, 2020Updated 5 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.β64Aug 9, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)β52Dec 26, 2022Updated 3 years ago
- β229Nov 18, 2025Updated 4 months ago
- Discover GPS location and private data exposure inside of images using this Burp & ZAP plugin.β17Jun 18, 2025Updated 9 months ago
- AWS CloudWatch Events Collectorβ13Feb 3, 2026Updated 2 months ago
- WiP - cve-search next genβ13Jan 18, 2020Updated 6 years ago
- The getting started sample demonstrates how to perform common tasks (CRUD operations) using the Azure Blob Service in Go.β10Mar 24, 2018Updated 8 years ago
- Converts openldap .schema files to .ldif for use in OpenLDAP 2.3+β18Mar 15, 2025Updated last year
- Low-interaction VNC honeypot with a static challenge.β23Aug 10, 2019Updated 6 years ago
- Yara syntax highlightingβ25Sep 4, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Frameworkβ26Mar 14, 2017Updated 9 years ago
- Identify vulnerabilities in your API's using the OpenAPI Security Scannerβ12Dec 6, 2018Updated 7 years ago
- HTTP bindings for Irmin in Goβ17Jun 17, 2016Updated 9 years ago
- Docker image for hosting and updating a private APT/YUM repository on Amazon S3β11Aug 31, 2021Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Pageβ14Feb 1, 2022Updated 4 years ago
- A lightweight web application firewall module for nginx, which is already used in the production environment.β14Mar 20, 2014Updated 12 years ago
- A prototype GreyNoise integration for FluentBit with Lua scripts.β11Feb 11, 2025Updated last year
- Open Source Threat Intelligence Chat Botβ321Mar 30, 2020Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by attaβ¦β23Jun 7, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Example detection of compromise credentials in AWSβ122Aug 6, 2018Updated 7 years ago
- β11Mar 9, 2016Updated 10 years ago
- provides a Suricata Eve output for Kafka with Suricate Eve pluginβ15Nov 25, 2021Updated 4 years ago
- Rex library for various exploitation helpersβ21Sep 24, 2025Updated 6 months ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what soβ¦β25Jul 5, 2021Updated 4 years ago
- β15Jun 24, 2018Updated 7 years ago
- Extract useful semantic from CVE descriptions usinig NLPβ25Jan 4, 2023Updated 3 years ago
- Test IAM Policies in Multi Account Structures in your CI/CD pipelineβ29Oct 1, 2021Updated 4 years ago
- Lateral Movement graph for Azure Active Directoryβ127Dec 8, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This firewall allows only communications made from allowed processes.β13Aug 10, 2016Updated 9 years ago
- β11Feb 9, 2023Updated 3 years ago
- β30Nov 15, 2018Updated 7 years ago
- Simple IP enrichment service and API wrapping PyASN and MaxMind GeoIP.β71Dec 8, 2022Updated 3 years ago
- Discover MSSQL Instances via UDP Scanningβ25Dec 17, 2018Updated 7 years ago
- Graph database version of the CVE databaseβ26Dec 8, 2022Updated 3 years ago
- Loading Bitcoin to TigerGraph and do realtime analysisβ22Oct 22, 2021Updated 4 years ago