Linux Security and Monitoring Scripts
☆329Sep 27, 2025Updated 6 months ago
Alternatives and similar repositories for LSMS
Users that are interested in LSMS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- An XSS Exploitation Tool☆339Dec 5, 2025Updated 4 months ago
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 10 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Kubernetes exploitation tool☆363Feb 25, 2026Updated last month
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆106Apr 21, 2024Updated last year
- PowerShell Script Analyzer☆69Oct 26, 2023Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 3 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆484Oct 14, 2022Updated 3 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- Wireshark RDP resources☆221Jun 2, 2025Updated 10 months ago
- ☆470Nov 20, 2024Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆677Feb 17, 2026Updated last month
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,069Mar 24, 2026Updated 3 weeks ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Updated this week
- ☆80Apr 18, 2023Updated 2 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,406Nov 7, 2024Updated last year
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Windows Oracle Database Attack Toolkit☆81Jul 30, 2022Updated 3 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆372Dec 24, 2021Updated 4 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,161Mar 8, 2026Updated last month
- Everything related to Linux Forensics☆718Jul 13, 2023Updated 2 years ago
- Course repository for PowerShell for Pentesters Course☆441Mar 9, 2022Updated 4 years ago
- Practical Windows Forensics Training☆763Feb 16, 2026Updated last month
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆129Sep 24, 2023Updated 2 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆211Feb 10, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆780Feb 3, 2023Updated 3 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,732Mar 21, 2026Updated 3 weeks ago
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆358Dec 14, 2023Updated 2 years ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆223May 2, 2025Updated 11 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆325May 1, 2025Updated 11 months ago