☆12Feb 15, 2024Updated 2 years ago
Alternatives and similar repositories for splunk_easm_worker
Users that are interested in splunk_easm_worker are comparing it to the libraries listed below
Sorting:
- ☆10Sep 12, 2024Updated last year
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- Defender Resource Hub☆30Feb 23, 2026Updated last week
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Instructions for installing FreeTAKServer, FreeTAKServer-UI, FreeTAKHub on RaspberryPI Ubuntu☆35Jul 31, 2022Updated 3 years ago
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- ☆16Updated this week
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Overlook is a MacOS-native remote console for GL.iNet GLKVM / Comet-style KVM devices.☆27Jan 20, 2026Updated last month
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Updated this week
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- ☆12Jan 17, 2026Updated last month
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- Tailscale System(d) (bootable) container for use with Podman Machine, Podman Desktop, MicroShift and OpenShift Local installations☆12Dec 30, 2024Updated last year
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- OCSF Schema Validation☆13Dec 13, 2024Updated last year
- Lists compiled by the ARC community to help with adoption☆13Jul 27, 2023Updated 2 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- Documentation for connecting Microsoft Sentinel and the ACSC CTIS platform☆10Jan 23, 2024Updated 2 years ago
- ☆10May 6, 2023Updated 2 years ago
- Smart weather dashboard. Integrates with OpenWeatherMaps and Ecobee. Designed to run on RaspberryPi.☆15Aug 19, 2023Updated 2 years ago
- Rsources that are publicly available, these resources are linked to the SANS SEC598 Class☆21Feb 2, 2026Updated last month
- ☆24Updated this week
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆17Jul 11, 2025Updated 7 months ago
- A PHP Class to parse and manipulate URLs☆13Jul 26, 2018Updated 7 years ago
- Strengthen your defense against web attacks with Kali Linux and Metasploit☆13Jan 30, 2023Updated 3 years ago
- ☆15Feb 12, 2023Updated 3 years ago
- Sigma to Wazuh rule converter☆18Sep 28, 2025Updated 5 months ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- a graph definition and execution library for python☆16Mar 22, 2023Updated 2 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago