Auth.log parser
☆47Apr 25, 2018Updated 7 years ago
Alternatives and similar repositories for logalyzer
Users that are interested in logalyzer are comparing it to the libraries listed below
Sorting:
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Feb 6, 2016Updated 10 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Proof of concept exploit for CVE-2017-3599☆23Apr 18, 2017Updated 8 years ago
- WarSQLi; "SQL" sunucularında (MS-SQL, MySQL,) bulunan zayıf şifre denemelerini gerçekleştirmek ve tespit edilen SQL hesaplarını kullanara…☆21Dec 19, 2023Updated 2 years ago
- ☆20Oct 22, 2019Updated 6 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- An extension for Chromium and Firefox browsers that extends magnet links on websites to enable the quick adding of torrents to Transmissi…☆13Aug 5, 2022Updated 3 years ago
- Some code for calculating cosmological distances☆14Aug 8, 2016Updated 9 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35May 21, 2025Updated 9 months ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- A collection of advent of code solutions.☆10Dec 28, 2015Updated 10 years ago
- Code repository for the paper "Geometric Scattering for Graph Data Analysis"☆13Aug 26, 2019Updated 6 years ago
- Artifical-intelligence☆10Dec 27, 2022Updated 3 years ago
- Flight computer software for UCLA's rocket team.☆13Mar 18, 2017Updated 8 years ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 5 months ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- Simple DB-agnostic migrations manager☆10Mar 4, 2021Updated 5 years ago
- NodeJS performance analyzer script used to identify degradation points in apps that expose http endpoints.☆15Mar 30, 2020Updated 5 years ago
- How to Code a Self-Hosted PHP/SQL Leaderboard For Your Game☆18Sep 27, 2013Updated 12 years ago
- The Zonemaster GUI - part of the Zonemaster project☆17Updated this week
- ☆10Jun 16, 2020Updated 5 years ago
- Indian Language Computing Project☆20Oct 6, 2012Updated 13 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- Simple module for interacting with Windows PowerShell via Qt / C++.☆10Feb 25, 2015Updated 11 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- 💬 Sentiment analyzer library using SentiWordnet in Go☆11Mar 11, 2021Updated 4 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- A simple secure tcp tunnel.☆11Feb 18, 2023Updated 3 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- VoiceRecorder is a simple voice/audio recorder☆13Nov 4, 2025Updated 4 months ago
- Telegram bot for Entware☆10Mar 24, 2016Updated 9 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago