☆34Jan 10, 2023Updated 3 years ago
Alternatives and similar repositories for sources
Users that are interested in sources are comparing it to the libraries listed below
Sorting:
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last week
- Kubernetes TPM Device Plugin☆12Jun 15, 2023Updated 2 years ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- A PowerShell module for querying the National Vulnerability Database☆24May 2, 2024Updated last year
- ☆16May 23, 2025Updated 9 months ago
- ☆18Feb 2, 2026Updated last month
- A simple linter for Sigma rules☆13Oct 22, 2020Updated 5 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆21Apr 17, 2023Updated 2 years ago
- Automated determination of which AWS services run where☆20Updated this week
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- Security Alert Decoration☆27Jul 21, 2025Updated 7 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- A few scripts I put together to send and receive data from an Azure Log Analytics workspace leveraging the Azure Monitor HTTP Data Collec…☆22May 22, 2023Updated 2 years ago
- This repository contains examples of Kyverno policies for controlling the creation of Cilium Network policies☆22Nov 2, 2023Updated 2 years ago
- A Python package and command line utility for scanning emails with YARA rules☆21Jan 23, 2026Updated last month
- Kerberos Haters Guide to Zeek Threat Hunting☆35Oct 14, 2021Updated 4 years ago
- Let the internet vote☆24May 28, 2025Updated 9 months ago
- Source Code for 'Learn PySpark' by Pramod Singh☆26Sep 10, 2019Updated 6 years ago
- Kubernetes Configuration Provider for Apache Kafka®☆29Jan 28, 2026Updated last month
- A tutorial on organizing python code into reusable units, building packages, and using conda.☆22Apr 10, 2017Updated 8 years ago
- Detect kerberos attacks in pcap files☆29Dec 13, 2015Updated 10 years ago
- Mastering Apex Programming, published by Packt☆30Mar 2, 2026Updated last week
- ☆27Feb 19, 2026Updated 2 weeks ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- Easily generate reproducible infrastructure☆40Dec 3, 2025Updated 3 months ago
- Provides a prometheus exporter for monitoring aspects secrets stored on a running HashiCorp Vault server☆32Oct 21, 2023Updated 2 years ago
- ☆35Jan 27, 2023Updated 3 years ago
- Cloud Native with Kubernetes, published by Packt☆36Jan 30, 2023Updated 3 years ago
- The operator manages the ovn-kube components running on the DPU card for enabling OVS hardware offloading.☆28Feb 13, 2026Updated 3 weeks ago
- A tool that allows downloading S3 directories as ZIP files☆34Apr 28, 2023Updated 2 years ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆39Jan 4, 2025Updated last year
- Searches for Insider Threat Hunting☆29May 2, 2019Updated 6 years ago
- A more obfuscated CactusTorch targeted towards office☆31Feb 4, 2021Updated 5 years ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆51Sep 22, 2025Updated 5 months ago