Sample SecOps scripts and Utilities
☆12Jun 19, 2024Updated last year
Alternatives and similar repositories for SecOpsSamples
Users that are interested in SecOpsSamples are comparing it to the libraries listed below
Sorting:
- Tool to query the RIPE database☆11Jun 2, 2025Updated 9 months ago
- Official specification and reference code for Fast Lightweight Online Encryption (FLOE)☆42Mar 9, 2026Updated last week
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- An Australian 16x Map for Farming Simulator FS17 - PC Only.☆16Oct 20, 2017Updated 8 years ago
- Large-scale Machine Learning using Apache Spark☆15May 6, 2019Updated 6 years ago
- The OWASP SAMM Website☆11Mar 7, 2026Updated last week
- Welcome to Optery’s open-source directory of data brokers and opt-out information, the largest of its kind.☆45Nov 12, 2025Updated 4 months ago
- Extensible MacOS system telemetry generator.☆53Mar 1, 2026Updated 2 weeks ago
- LogZilla NetOps Platform: Network Insight, Simplified☆21Feb 21, 2026Updated 3 weeks ago
- Dataset fingerprinting for AIBOM☆15Feb 18, 2026Updated last month
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- ☆21Dec 20, 2023Updated 2 years ago
- 🦀 🙀 Simple yarn.lock parser☆20Feb 13, 2026Updated last month
- ☆26Aug 31, 2023Updated 2 years ago
- ☆26Mar 11, 2025Updated last year
- ☆13Apr 6, 2016Updated 9 years ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- ☆10Apr 6, 2024Updated last year
- UPlay - UPnP/DLNA Plex Video Channel Plug-in☆12Nov 29, 2014Updated 11 years ago
- Icon collection for open source Docker Apps.☆14Aug 29, 2023Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- ☆12Apr 20, 2025Updated 11 months ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Facial Recognition and Steganography☆10Oct 26, 2019Updated 6 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- Dark Light Viewer - a tool to conduct change detection over time using VIIRS night lights data.☆33Mar 3, 2026Updated 2 weeks ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 9 months ago
- Script to create MITRE ATT&CK Navigator layers from the annotated detection rules in Elastic Security (Kibana).☆20Jul 1, 2023Updated 2 years ago
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- OASIS TC Open Repository: CSAF Parser tool for parsing and checking the syntax of the Common Vulnerability Reporting Framework (CVRF) con…☆24Jul 14, 2022Updated 3 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Sep 1, 2023Updated 2 years ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆53Mar 4, 2026Updated 2 weeks ago
- scripts and configs from .conf2016 talk on Hunting the Known Unknowns PowerShell Edition☆15Oct 25, 2016Updated 9 years ago
- ☆11Mar 12, 2017Updated 9 years ago
- Isomorphic web application built using the Navigation router and Edge.js☆11Apr 5, 2016Updated 9 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago