jivoi / ids_and_siem
intrusion detection
☆23Updated 7 years ago
Alternatives and similar repositories for ids_and_siem:
Users that are interested in ids_and_siem are comparing it to the libraries listed below
- home! sweet home☆23Updated 5 years ago
- openvpn server configs☆13Updated 8 years ago
- only for 31337☆22Updated 8 years ago
- how-to monitor Docker hosts☆10Updated 8 years ago
- cool dockerfiles☆12Updated 8 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- buffer overflow examples☆21Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- ☆20Updated 8 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 5 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- The goal of this program is to quickly pull and install repos from its list☆39Updated 2 years ago
- recon-ng Maltego local transform pack☆39Updated 11 years ago
- Software exploitation training material☆15Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Custom scripts used during the scenario☆21Updated 3 years ago
- A scripted library of hacking techniques.☆18Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Script to automate, manage, and multithread Nikto scans.☆57Updated 4 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated 2 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆30Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 6 years ago