The main gravwell monorepo for ingesters and ingest code
☆52Apr 8, 2026Updated this week
Alternatives and similar repositories for gravwell
Users that are interested in gravwell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Dec 7, 2022Updated 3 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 10 months ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated 2 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆25Nov 18, 2016Updated 9 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- DNS and dig is ugly, and implementing them into your web application is even uglier. But not any longer, for here is dnsjson.com☆18Sep 14, 2020Updated 5 years ago
- A Docker based Honey Pot☆17Oct 3, 2018Updated 7 years ago
- Collection of walkthroughs on various threat hunting techniques☆77Aug 3, 2020Updated 5 years ago
- ☆12Feb 15, 2016Updated 10 years ago
- ☆12Oct 10, 2024Updated last year
- Abstract File Storage Connectors☆13Mar 11, 2026Updated 3 weeks ago
- ☆34Apr 5, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆105Apr 26, 2022Updated 3 years ago
- Postgres date column parser☆17Feb 8, 2026Updated 2 months ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 8 months ago
- 🚀 A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.☆23Mar 23, 2026Updated 2 weeks ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆58Jun 29, 2023Updated 2 years ago
- Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..☆28Oct 20, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆21Aug 25, 2015Updated 10 years ago
- Did someone say types?☆13Sep 5, 2016Updated 9 years ago
- Amazon S3 storage interface for a Go cache☆29Dec 2, 2014Updated 11 years ago
- A python based semi-automatic buffer overflow exploit script☆16Sep 6, 2020Updated 5 years ago
- A template repository for building external data providers for Gatekeeper.☆12Aug 14, 2023Updated 2 years ago
- 🕵🏽 macOS Big Sur desktop app to monitor active TCP connections through the lens of GreyNoise☆33Jun 11, 2022Updated 3 years ago
- ☆25Dec 10, 2018Updated 7 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 10 months ago
- Universal Honey Pot☆29Aug 27, 2025Updated 7 months ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Rdio Scanner is an open source software that ingest and distribute audio files generated by various software-defined radio recorders. Its…☆33Apr 6, 2022Updated 4 years ago