The main gravwell monorepo for ingesters and ingest code
☆52Mar 5, 2026Updated this week
Alternatives and similar repositories for gravwell
Users that are interested in gravwell are comparing it to the libraries listed below
Sorting:
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Oct 25, 2015Updated 10 years ago
- A Docker based Honey Pot☆17Oct 3, 2018Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated last month
- ☆25Dec 10, 2018Updated 7 years ago
- 🚀 A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.☆23Mar 2, 2026Updated last week
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 8 months ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Jun 29, 2023Updated 2 years ago
- Script to spider a website and find publicly open S3 buckets☆29Oct 1, 2020Updated 5 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- ☆25Nov 18, 2016Updated 9 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Nov 12, 2023Updated 2 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 6 months ago
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- The glue that bonds AWS, terraform and Github Actions.☆30Feb 3, 2026Updated last month
- Orchestration and memory for multi-agent systems☆14Feb 6, 2026Updated last month
- Go SDK and CLI for LM Studio: manage, interact, and run LLMs via WebSocket API☆12Sep 8, 2025Updated 6 months ago
- PowerShell module that provides some functionality to facilitate automating backup actions of a FortiGate device over SSH. This module al…☆10Feb 10, 2021Updated 5 years ago
- Generate 3d printable braille from text using OpenJsCad☆16Aug 3, 2013Updated 12 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Jul 14, 2017Updated 8 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Provides a Learning Tools Interoperability (LTI) integration for creating WordPress blogs with appropriate user roles based on roles set …☆12Mar 17, 2025Updated 11 months ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- ☆13Jul 11, 2022Updated 3 years ago
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- ☆12Aug 25, 2014Updated 11 years ago
- Set of python scripts to interact with the Dynatrace APIs and export security related in different formats.☆10Jan 14, 2026Updated last month
- ☆15Mar 11, 2025Updated 11 months ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Remote Administration Tool☆10Mar 27, 2025Updated 11 months ago