Elasticsearch for Offensive Security
☆139Aug 21, 2020Updated 5 years ago
Alternatives and similar repositories for docker_offensive_elk
Users that are interested in docker_offensive_elk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple tool to send the json output from HTTPX to BBRF☆11Mar 30, 2023Updated 3 years ago
- A web-based dashboard for importing and viewing nmap scan results☆15May 1, 2023Updated 2 years ago
- NMap XML decoding for logstash☆28Nov 16, 2022Updated 3 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Vulnerability Data in ES☆143Oct 17, 2017Updated 8 years ago
- ☆36Jan 4, 2026Updated 2 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Dec 8, 2022Updated 3 years ago
- Examples for Advanced Web Hacking Workshop☆34Dec 30, 2019Updated 6 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆758Jul 17, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Jun 30, 2025Updated 9 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Create actionable data from your Vulnerability Scans☆1,395Dec 27, 2022Updated 3 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,624Dec 13, 2025Updated 3 months ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆279Feb 11, 2021Updated 5 years ago
- Interactive Network Scanner☆1,038Oct 21, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Docker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning☆103Mar 3, 2026Updated 3 weeks ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- External monitoring for organization assets☆421Jun 5, 2024Updated last year
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Jul 8, 2019Updated 6 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Jira Information Gatherer☆29Dec 3, 2017Updated 8 years ago
- A command line security audit tool for Amazon Web Services☆82Mar 4, 2019Updated 7 years ago
- Words list generator to crack security tokens☆110May 20, 2020Updated 5 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Jan 24, 2020Updated 6 years ago
- Backdoor detection for VMware view☆13Jan 5, 2022Updated 4 years ago
- Automated Tactics Techniques & Procedures☆259May 26, 2023Updated 2 years ago