☆19Jan 27, 2022Updated 4 years ago
Alternatives and similar repositories for SA-ctf_scoreboard_admin
Users that are interested in SA-ctf_scoreboard_admin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆125Jan 27, 2022Updated 4 years ago
- Data Governance app for Splunk☆12Oct 19, 2023Updated 2 years ago
- ☆14May 30, 2018Updated 7 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11Jun 24, 2021Updated 4 years ago
- An Anaconda customization environment using Vagrant☆16Jun 27, 2022Updated 3 years ago
- ☆457Aug 8, 2024Updated last year
- Custom Splunk search command to reconstruct a pstree from Sysmon process creation events (EventCode 1)☆24Mar 30, 2026Updated last month
- Coreboot payload for PC Engines APU2 that sort boot order and save it to flash.☆15May 30, 2025Updated 11 months ago
- Splunk Boss of the SOC version 2 dataset.☆424Nov 1, 2022Updated 3 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Jun 3, 2020Updated 5 years ago
- ☆12Mar 28, 2026Updated last month
- Ingest demo logs using API and log.ingest access tokens☆15Mar 18, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 11 months ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Sep 8, 2021Updated 4 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 13 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 7 years ago
- Bobbin is a webapp for viewing and sharing twitter threads☆16Jan 25, 2023Updated 3 years ago
- An Open Source KoTH Platform☆12Jul 19, 2023Updated 2 years ago
- 64-bit TrueCrypt on macOS.☆17Nov 12, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This project connects SNMP Trap sending source to Splunk Enterprise and Splunk Enterprise Cloud☆10Dec 14, 2021Updated 4 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- Repository for my ATT&CK analysis research.☆70May 16, 2019Updated 6 years ago
- Ansible role for managing Dell PowerConnect switches☆19Oct 31, 2023Updated 2 years ago
- Terraform Virtual Machine Module☆15Mar 14, 2025Updated last year
- a keep-alive agent for node http & https with a really snappy name☆32May 2, 2017Updated 9 years ago
- Still in dev mode☆12Apr 24, 2018Updated 8 years ago
- The UCLA Information Security Office customized an integration of Logstash, Elasticsearch, and Kibana (the "ELK stack") to extract securi…☆22Mar 3, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Build a attack range in your local machine☆131May 8, 2023Updated 2 years ago
- MediaWiki dark-colored skin based on Vector☆13Jun 29, 2024Updated last year
- ☆10Apr 18, 2019Updated 7 years ago
- Annotate IDA with source and line number information from a PDB☆15Apr 15, 2021Updated 5 years ago