A tool to modify timestamps in a packet capture to a user selected date
☆31Aug 11, 2021Updated 4 years ago
Alternatives and similar repositories for forgedpillow
Users that are interested in forgedpillow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- An IOC framework written in PowerShell☆19Jan 3, 2017Updated 9 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- Publicly shareable windows event log message data☆28Nov 29, 2019Updated 6 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated last month
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- threadmap plugin for Volatility Foundation☆27Aug 23, 2021Updated 4 years ago
- This package allows the use of a custom Elastalert Alert which creates alerts with observables in TheHive using TheHive4Py.☆26May 18, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Archive of Metasploit CTF challenges.☆14Jan 21, 2022Updated 4 years ago
- ☆25Jul 12, 2023Updated 2 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Dec 4, 2024Updated last year
- Shell and Pen-testing Tool☆17May 14, 2025Updated 10 months ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Apr 6, 2022Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆115May 18, 2020Updated 5 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Feb 9, 2021Updated 5 years ago
- ☆18Feb 25, 2024Updated 2 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- Forensics scripts aimed at automating & enhancing the Forensics Legend Eric Zimmerman's techniques, integrating the statistical detection…☆18Sep 7, 2023Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- C12Adpater Open Source☆16Aug 25, 2021Updated 4 years ago
- Amazon EC2 Container Service Agent☆11Jan 16, 2025Updated last year
- Serverless honeytoken 🕵🏻♂️☆81Jan 10, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Jul 21, 2021Updated 4 years ago
- Zeek support for Community ID flow hashing.☆36Jul 11, 2023Updated 2 years ago
- God Mode Detection Rules☆132Aug 8, 2024Updated last year
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- Splunk TA for sending completion requests to ChatGPT☆27May 18, 2024Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Mar 19, 2026Updated last week