jivoi / ids_and_siem
intrusion detection
☆23Updated 7 years ago
Alternatives and similar repositories for ids_and_siem:
Users that are interested in ids_and_siem are comparing it to the libraries listed below
- only for 31337☆22Updated 8 years ago
- openvpn server configs☆13Updated 8 years ago
- home! sweet home☆23Updated 5 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- how-to monitor Docker hosts☆10Updated 8 years ago
- cool dockerfiles☆12Updated 8 years ago
- buffer overflow examples☆21Updated 7 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- recon-ng Maltego local transform pack☆39Updated 11 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆13Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆35Updated 5 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- The goal of this program is to quickly pull and install repos from its list☆39Updated 2 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago