Plug-ins for AlienVault of course.
☆16Jul 5, 2017Updated 8 years ago
Alternatives and similar repositories for AlienVault-Plugins
Users that are interested in AlienVault-Plugins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Jul 4, 2017Updated 8 years ago
- To parse though Cisco IOS and ASA configs(and compare 2) to pull information out and into a text file or DB.☆16Aug 23, 2019Updated 6 years ago
- This is a collection of scripts to pull information from the configuration files of various network devices (eg. Cisco routers and switch…☆20Jul 1, 2015Updated 10 years ago
- Sigma rules converted for direct use with Zircolite☆14Apr 9, 2026Updated last week
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Mar 24, 2022Updated 4 years ago
- a tools for erp penetration testing☆16Dec 26, 2019Updated 6 years ago
- Creates AD user, Exchange Account, and Home Drive☆18Mar 6, 2019Updated 7 years ago
- ☆22Aug 29, 2024Updated last year
- ConfigMgr Web Tools☆20May 3, 2019Updated 6 years ago
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- Exploit for HEVD☆10Sep 11, 2019Updated 6 years ago
- `busybox` Docker image for multiple architectures☆12Jun 8, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆26Nov 26, 2025Updated 4 months ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- ☆16Dec 16, 2020Updated 5 years ago
- ☆18May 6, 2023Updated 2 years ago
- Source for lemon-model.net☆13Jan 27, 2022Updated 4 years ago
- [MIRROR] arch testing tool☆12Apr 25, 2023Updated 2 years ago
- ☆19Jun 8, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- exploit-database-papers☆14Nov 27, 2017Updated 8 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- Utilities for Pentesting with BloodHound☆23Apr 7, 2026Updated last week
- Amlogic G12A Mali support for Mali Bifrost based SoCs, for Mainline Linux only☆11Jan 28, 2023Updated 3 years ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Jan 17, 2024Updated 2 years ago
- Periodically reloads a dashing dashboard in the browser.☆14May 15, 2014Updated 11 years ago
- ☆36Feb 14, 2023Updated 3 years ago
- Retrieve Microsoft Teams PSTN Records for Calling Plan and Direct Routing Users☆45Mar 31, 2023Updated 3 years ago
- Java Library for Developing Microsoft Outlook Add-ins☆13Apr 24, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Download docker images from the docker hub to use them with other containers engine☆30Jan 17, 2015Updated 11 years ago
- Chymeric Gentoo Overlay☆16Feb 3, 2026Updated 2 months ago
- Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED☆17Nov 27, 2023Updated 2 years ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆21Dec 16, 2025Updated 3 months ago
- Sample to support iPXE boot of Gentoo Minimal livecd☆19Jan 6, 2022Updated 4 years ago
- File Integrity Monitoring (FIM) SaltStack Module☆13Aug 26, 2015Updated 10 years ago
- Create gentoo openstack-compatible images☆16Dec 24, 2023Updated 2 years ago