Simple parser to get useful information from AWS S3 logs
☆27Sep 5, 2021Updated 4 years ago
Alternatives and similar repositories for s3logparse
Users that are interested in s3logparse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Identify Azure blobs using a wordlist of account name and container name strings☆45Mar 13, 2025Updated last year
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆21Aug 3, 2024Updated last year
- Repo to hold my PowerShell Scripts☆17Oct 19, 2022Updated 3 years ago
- Hunt the windows Registry automatically using VQL☆14Jan 6, 2026Updated 2 months ago
- ☆10Aug 9, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 504 VSAgent☆25Feb 21, 2018Updated 8 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- EVM Emergency wallet drainer☆11Aug 2, 2023Updated 2 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆129Jan 31, 2022Updated 4 years ago
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- A test case runner for Sigma rules☆14Aug 14, 2024Updated last year
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆11Oct 21, 2020Updated 5 years ago
- WH-ApkCrypter 100% google play bypass☆13May 3, 2020Updated 5 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆79May 25, 2020Updated 5 years ago
- Convert your spreadsheet or CSV for the GIAC exam to a more compact index. Inspired by Voltaire and usable offline.☆20Jun 6, 2025Updated 9 months ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- SPI flash read MitM attack PoC☆40May 24, 2022Updated 3 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- python 2 arp poisonner☆15Sep 30, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- ☆13Aug 11, 2022Updated 3 years ago
- Code injection from Linux kernel to a process☆24May 19, 2023Updated 2 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- ☆10Jul 24, 2023Updated 2 years ago
- Performance Monitor Volatile Environment LPE☆18Jun 28, 2025Updated 8 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆416Oct 6, 2025Updated 5 months ago
- LLM prompt attacks for hacker CTFs via CTFd.☆14Dec 17, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Sep 26, 2023Updated 2 years ago
- Library of functions to apply Data Science in several forensics artifacts☆41Aug 19, 2024Updated last year
- Introducing SQLMAP into non-HTTP services.☆13Oct 24, 2019Updated 6 years ago
- Graphical model of a TCP/IP stack which can be used as a cheatsheet when developing BPF filters.☆16Dec 10, 2019Updated 6 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago