A Golang API for TheHive
☆13Sep 3, 2020Updated 5 years ago
Alternatives and similar repositories for hive4go
Users that are interested in hive4go are comparing it to the libraries listed below
Sorting:
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- Integration tools for TheHive and Azure Sentinel☆13Sep 23, 2020Updated 5 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆16Apr 5, 2024Updated last year
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- 🌊 Dockerfiles for apps I use. Also take a look at https://github.com/security-dockerfiles☆24Dec 24, 2020Updated 5 years ago
- Scripts for TheHive.☆23Nov 15, 2019Updated 6 years ago
- Swagger/ OpenAPI specifications for security products and services☆77Feb 9, 2026Updated 3 weeks ago
- DashingJS is a open source AngularJS based framework that lets you build beautiful dashboards.☆11Jan 14, 2018Updated 8 years ago
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- A Golang Implementation of a non-interactive Schnorr ZKP over Elliptic Curves☆10Sep 1, 2019Updated 6 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Command line utility and package for querying Steam A2S server information, featuring support for Arma 3 and DayZ. Outputs are displayed …☆19Jan 31, 2026Updated last month
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Benchmarks to compare golang geohash implementations☆12Aug 6, 2018Updated 7 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- sample code test here☆11Apr 14, 2024Updated last year
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- Quá trình tìm hiểu Openstack☆13Jun 24, 2022Updated 3 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Go keychain management library☆10Aug 5, 2019Updated 6 years ago
- Translator micro-service☆10Oct 19, 2018Updated 7 years ago
- How to backdoor Diffie-Hellman, lessons learned from the Socat non-prime prime☆11Jun 29, 2021Updated 4 years ago
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year
- ☆11Jun 9, 2020Updated 5 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Go library for the RfxCom RFXtrx 433 transmitter / receiver☆19Nov 14, 2022Updated 3 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- Is your password safe?☆12Dec 16, 2015Updated 10 years ago
- Marlin Simulator UI☆15Feb 19, 2026Updated 2 weeks ago
- more extensions for https://rpcx.io☆10Apr 11, 2021Updated 4 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago