jivoi / ids_and_siemLinks
intrusion detection
☆24Updated 8 years ago
Alternatives and similar repositories for ids_and_siem
Users that are interested in ids_and_siem are comparing it to the libraries listed below
Sorting:
- only for 31337☆24Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆86Updated 10 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 13 years ago
- home! sweet home☆24Updated 6 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- openvpn server configs☆14Updated 9 years ago
- recon-ng Maltego local transform pack☆41Updated 12 years ago
- Passive recon / OSINT automation script☆39Updated 7 years ago
- Custom Maltego transforms☆68Updated 10 years ago
- PHP Phishing Framework☆28Updated 12 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago
- Pentest ToolKit☆28Updated 5 years ago
- buffer overflow examples☆22Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- devops scripts☆33Updated 9 years ago
- The goal of this program is to quickly pull and install repos from its list☆41Updated 3 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆115Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- scripts for pentesting☆86Updated 7 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆84Updated 7 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- ☆15Updated 2 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 7 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- A SIEM inspired by HECTOR, built on Django.☆27Updated 6 years ago
- The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with 50+ secur…☆31Updated last week
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- ☆19Updated 10 years ago
- Look up an email domain (@example.com), using Python, across all known domains.☆46Updated 2 years ago
- Enumerate subdomains through Virustotal☆32Updated 6 years ago