This repository contains code to create a ELK stack with certificates & security enabled using docker-compose
☆192Jun 6, 2024Updated last year
Alternatives and similar repositories for elk-tls-docker
Users that are interested in elk-tls-docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- This repository contains data related to coronavirus & COVID-19 based domains identified by Swimlane's DeepDive research team☆11Jul 6, 2020Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- Event Data Collector☆40Mar 23, 2026Updated last month
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 8 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆324Jan 22, 2021Updated 5 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- A python package for use in generating fake data for SOC and security automation.☆174Mar 7, 2025Updated last year
- 💼 Office 365 REST API wrapper. Strongly typed.☆19Nov 4, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- RDP Checker☆65Feb 23, 2024Updated 2 years ago
- ☆18Jun 14, 2023Updated 2 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆37Jan 14, 2022Updated 4 years ago
- Cymothoa is a backdooring tool, that inject backdoor's shellcode directly into running applications. Stealth and lightweight...☆19Aug 24, 2015Updated 10 years ago
- ☆37Apr 30, 2020Updated 6 years ago
- 💩 I don't always do dirty checking, but when I do, I use El Segundo.☆20Feb 7, 2022Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 6 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine☆554Apr 10, 2026Updated last month
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- Understand adversary tradecraft and improve detection strategies☆715Mar 9, 2023Updated 3 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- Collection of Slides From My Conference Talks☆21Nov 21, 2022Updated 3 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- Easily mock your REST API in Cypress using fixtures☆17Feb 19, 2025Updated last year
- This Azure Code sample provides powershell scripts to automate deployment and collection of Azure Stack cloud operational data to OMS.☆14Jul 12, 2021Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated 2 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆61Jun 2, 2018Updated 7 years ago
- ☆65Jun 5, 2021Updated 4 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 5 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago