One Day of Python for SaintCon 2022
☆11Jan 3, 2023Updated 3 years ago
Alternatives and similar repositories for SaintconPython
Users that are interested in SaintconPython are comparing it to the libraries listed below
Sorting:
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- Tailscale System(d) (bootable) container for use with Podman Machine, Podman Desktop, MicroShift and OpenShift Local installations☆12Dec 30, 2024Updated last year
- Lateral Movement and Data Access artifacts for Velociraptor☆17Dec 2, 2025Updated 2 months ago
- ☆12Jan 17, 2026Updated last month
- ☆10May 6, 2023Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Sep 2, 2025Updated 5 months ago
- Smart weather dashboard. Integrates with OpenWeatherMaps and Ecobee. Designed to run on RaspberryPi.☆15Aug 19, 2023Updated 2 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- ☆15Feb 7, 2025Updated last year
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- ☆16Feb 19, 2026Updated last week
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆17Jul 11, 2025Updated 7 months ago
- ☆24Updated this week
- The pattern matching swiss knife☆16Oct 28, 2019Updated 6 years ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated last year
- Open source incident management and response platform.☆14Mar 16, 2018Updated 7 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Sigma to Wazuh rule converter☆18Sep 28, 2025Updated 4 months ago
- A PHP Class to parse and manipulate URLs☆13Jul 26, 2018Updated 7 years ago
- Protecting Windows-Server against RDP (Remote-Desktop) attacks (Ban after X attempts, with report function for AbuseIPDB.com)☆14Oct 19, 2018Updated 7 years ago
- Library for reading KeePass files and decrypt the passwords within it☆14Jun 25, 2024Updated last year
- ☆11Jun 12, 2023Updated 2 years ago
- Workspace is a powerful application designed to install and manage all your repositories in your chosen destination.☆16Jul 5, 2025Updated 7 months ago
- ☆12Feb 15, 2024Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- Splunk csv to KVStore ES Threat Intel☆11Jul 11, 2016Updated 9 years ago
- endlessh auto reporting IPs to abuseipdb.com☆16Jan 15, 2025Updated last year
- Pentest automation resources for Burp☆15Mar 10, 2024Updated last year
- This is a CLI tool to check a csv of email addresses and user names in https://haveibeenpwned.com☆13Jul 13, 2018Updated 7 years ago