☆83Nov 14, 2025Updated 3 months ago
Alternatives and similar repositories for brickstorm-scanner
Users that are interested in brickstorm-scanner are comparing it to the libraries listed below
Sorting:
- ☆14Dec 5, 2014Updated 11 years ago
- Tox Push Message App☆16Nov 20, 2025Updated 3 months ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆29Aug 4, 2025Updated 7 months ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Apr 24, 2025Updated 10 months ago
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 7 months ago
- Monitoring Veeam B&R Community Edition with prometheus and grafana☆34Sep 4, 2025Updated 6 months ago
- A collection of CVEs weaponized by ransomware operators☆130Oct 13, 2025Updated 4 months ago
- On this repo you will find everythig to pass your Junior Penetration Tester Exam☆15Aug 29, 2023Updated 2 years ago
- DShield Sensor Log Collection with ELK☆45Feb 16, 2026Updated 2 weeks ago
- The largest collection of wordlists in yaml for bug bounty tools☆37Apr 7, 2024Updated last year
- Official Documentation for the Synclavier® Digital Audio System☆12Oct 29, 2024Updated last year
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆159Jun 15, 2023Updated 2 years ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆43Oct 21, 2018Updated 7 years ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆456Updated this week
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 2 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- ☆15Sep 4, 2024Updated last year
- Deploy your DNS configuration using GitHub Actions using DNSControl.☆11Feb 19, 2026Updated last week
- Engineering Guidance and Standards for the Home Office☆21Updated this week
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- My Lisk, Shift, Ark, Rise, Oxy, Kapu, Oxy redistribution software☆15Jul 27, 2021Updated 4 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- ☆46Oct 27, 2023Updated 2 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- telegram library☆10Apr 5, 2021Updated 4 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Open source RAN UE centric security testing software.☆14Feb 13, 2026Updated 2 weeks ago
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 7 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago