High performance, attack detection from web server logs.
☆11May 16, 2019Updated 6 years ago
Alternatives and similar repositories for security-log
Users that are interested in security-log are comparing it to the libraries listed below
Sorting:
- Git Repo and Filesystem credential scanner☆18Sep 8, 2017Updated 8 years ago
- Detecting attack tool for HTTP server such as Apache and Nginx.☆10Dec 22, 2013Updated 12 years ago
- ☆15Nov 11, 2015Updated 10 years ago
- A collection of demisto tools☆20Dec 29, 2025Updated 2 months ago
- 一个用来xss劫持会话利用的chrome插件☆13Sep 3, 2014Updated 11 years ago
- 前端信息安全☆10Nov 8, 2017Updated 8 years ago
- 《安全档案》信息安全技术期刊☆11Mar 30, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- 跨平台服务器文件安全监控软件,支持短信预警☆10Apr 11, 2017Updated 8 years ago
- 社工必备工具箱 Social engineering tools for SNS websites☆13Feb 19, 2017Updated 9 years ago
- ZipCrack with Python☆10Sep 8, 2017Updated 8 years ago
- Dockerized version of cow https://github.com/cyfdecyf/cow☆10Sep 25, 2015Updated 10 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- A little privilege escalator in Rust, for learning.☆15May 2, 2020Updated 5 years ago
- ☆75Aug 29, 2014Updated 11 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆16Jan 19, 2020Updated 6 years ago
- 收集的各大公 司发布的物联网安全年度报告☆13Jul 31, 2017Updated 8 years ago
- ☆14Dec 27, 2023Updated 2 years ago
- ARP攻击的原理与实现.☆11Apr 7, 2019Updated 6 years ago
- 进程保护☆17Mar 31, 2013Updated 12 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Simple transparent proxy on your router via v2ray/ss☆12Apr 20, 2021Updated 4 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- ☆15Jul 11, 2018Updated 7 years ago
- A type-filtering wrapper for the standard ls Unix utility☆13Mar 11, 2026Updated last week
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- 딥러닝을 이용한 3쿠션 힌트 안드로이드앱(3-Cushion Hint with Deep Learning)☆13Jun 2, 2021Updated 4 years ago
- ☆14Jan 24, 2016Updated 10 years ago
- A python RCE exploit on QNAP-QTS☆15Sep 15, 2020Updated 5 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- IDA Pro plugin to view Exports☆17Sep 21, 2018Updated 7 years ago
- ☆10Jun 9, 2021Updated 4 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- Cyber Intel Management☆51Jan 25, 2018Updated 8 years ago
- ☆10Aug 26, 2016Updated 9 years ago