intrusion detection
☆26Jun 14, 2017Updated 8 years ago
Alternatives and similar repositories for ids_and_siem
Users that are interested in ids_and_siem are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- devops scripts☆33Dec 8, 2016Updated 9 years ago
- site source jivoi.github.io☆23Nov 7, 2022Updated 3 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Use Tor for anonymous scanning with nmap☆95Jun 19, 2015Updated 10 years ago
- openVAS with ansible☆21Apr 22, 2015Updated 11 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 8 months ago
- open source society university☆32Jun 22, 2016Updated 9 years ago
- just for fun ¯\_(ツ)_/¯☆281Sep 21, 2016Updated 9 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Penetration Testing/Security Cheatsheets☆65Oct 31, 2015Updated 10 years ago
- Evading Snort Intrusion Detection System.☆77Sep 18, 2021Updated 4 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Jul 6, 2017Updated 8 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated 2 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple NTFS crawler.☆57Aug 3, 2017Updated 8 years ago
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 5 years ago
- My Collection of x64 Assembly programs with NASM☆19Oct 21, 2018Updated 7 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Jan 10, 2018Updated 8 years ago
- PHP MYSQL☆18Feb 10, 2023Updated 3 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Konsolenprogramme☆17Nov 25, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- zellularautomat☆17Nov 19, 2025Updated 5 months ago
- your offsec knowledge☆487Oct 9, 2019Updated 6 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54May 3, 2024Updated 2 years ago
- genalg zellularautomat☆17Nov 19, 2025Updated 5 months ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Emulate the AWS IoT Button on a Raspberry Pi with a simple push button using this C++ sample☆10Sep 16, 2016Updated 9 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago