Some resources to facilitate my blog on auditd for security monitoring
☆13Mar 23, 2023Updated 3 years ago
Alternatives and similar repositories for linux-audit
Users that are interested in linux-audit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 3 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Feb 6, 2025Updated last year
- ADS-B tools for Python☆13May 28, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- ONUG Cloud Security Notification Framework (CSNF)☆19Oct 14, 2024Updated last year
- ☆66May 21, 2024Updated 2 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Configuration of LogStash (and Filebeat) for Analytics treatment.☆17Jun 25, 2018Updated 7 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.☆26Feb 5, 2026Updated 3 months ago
- Aggregates all the mining pool lists available online (domains + IPs).☆28Feb 21, 2021Updated 5 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆61May 25, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 7 years ago
- A framework for synthesizing lateral movement login data.☆29May 20, 2021Updated 5 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- Convert Splunk SPL to ClickHouse SQL with pegjs☆14Jul 19, 2022Updated 3 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆13May 7, 2025Updated last year
- Sense Collector provides a way of collecting real-time data from the Sense Energy Monitor. Includes Grafana dashboards for visualizations…☆29Oct 3, 2024Updated last year
- ☆33Mar 24, 2026Updated last month
- Simple project for live audio streaming and recording from an I2S MEMS microphone (INMP441) over UDP, using an ESP8266 (NodeMCU). The ESP…☆28Mar 19, 2026Updated 2 months ago
- ☆46May 11, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 2 months ago
- 🌦️ Domain Ranker☆16Sep 7, 2019Updated 6 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 10 years ago
- Data Prakiraan Cuaca Terbuka BMKG☆47Oct 12, 2025Updated 7 months ago
- ☆14Jun 7, 2018Updated 7 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- Active Directory change tracking☆17Dec 29, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Blizzard CTF 2017: Sombra True Random Number Generator (STRNG).☆18May 20, 2018Updated 8 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- An Adaptive Misuse Detection System☆47Nov 4, 2024Updated last year
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆103Aug 15, 2025Updated 9 months ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Red Team Coin for crypto-mining operations.☆24Mar 1, 2026Updated 2 months ago