hocchudong / ghichep-IDS-IPS-SIEMLinks
Ghi chép về snort, suricata, SIEM, OSSEC ...
☆11Updated 6 years ago
Alternatives and similar repositories for ghichep-IDS-IPS-SIEM
Users that are interested in ghichep-IDS-IPS-SIEM are comparing it to the libraries listed below
Sorting:
- Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, use…☆13Updated 2 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 3 years ago
- Python Digital Forensics [video], published by Packt☆21Updated 2 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆14Updated 5 years ago
- The Advanced Automated Pentesting And Forensics Tool☆27Updated 2 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Advanced Infrastructure Penetration Testing, published by Packt☆29Updated 2 years ago
- This repo contains workshop material delivered at #nullcon2020☆16Updated 5 years ago
- Strengthen your defense against web attacks with Kali Linux and Metasploit☆14Updated 2 years ago
- Enumerate AWS S3 buckets using different permutations☆17Updated 3 years ago
- Learning Python Web Penetration Testing, published by Packt☆42Updated 2 years ago
- Perform CVE lookup on cvedetails.com☆27Updated last year
- Security checks for your researches☆34Updated 4 years ago
- AWS Penetration Testing, published by Packt☆33Updated 2 years ago
- Materials and Synopsis of the course Certified Network Security Specialist (CNSS) provided by The International CyberSecurity Institute (…☆29Updated 5 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 4 months ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 4 months ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 4 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆35Updated 5 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆41Updated 7 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 8 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated last year
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Updated 2 months ago
- Automated Recon Framework☆24Updated 5 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 3 years ago
- Code Repository for CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019, published by Packt☆13Updated 2 years ago