Files from my Storm Center Articles
☆17Jan 17, 2024Updated 2 years ago
Alternatives and similar repositories for ISC_Posts
Users that are interested in ISC_Posts are comparing it to the libraries listed below
Sorting:
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆14Aug 22, 2020Updated 5 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23May 4, 2016Updated 9 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- scripts to help beginners program in Bro☆21Aug 10, 2013Updated 12 years ago
- Zac's assorted config files☆10Jan 11, 2017Updated 9 years ago
- ☆72Nov 17, 2021Updated 4 years ago
- ☆15Dec 20, 2019Updated 6 years ago
- ☆14Nov 12, 2021Updated 4 years ago
- Contributed Bro Scripts☆30May 28, 2014Updated 11 years ago
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆32Oct 13, 2018Updated 7 years ago
- AsusWRT-Merlin HND CPU Temperature Logging Script☆10May 9, 2024Updated last year
- Track public endpoints and connections across AWS accounts using VPC Flow Logs☆12Jun 14, 2016Updated 9 years ago
- AlienVault Open Threat Exchange App For Splunk☆10May 6, 2014Updated 11 years ago
- Docker container running cowrie with DShield output enabled.☆17Jun 8, 2016Updated 9 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago
- Bro scripts to be shared with the community☆110Mar 6, 2013Updated 13 years ago
- Resolve problem with Asus Merlin routers in terms of release/renew of udhcpc.☆17May 23, 2023Updated 2 years ago
- nexpose python client library☆10Oct 12, 2019Updated 6 years ago
- A curated list of awesome threat detection and hunting resources☆16Sep 12, 2018Updated 7 years ago
- Deploy uptime-kuma(easy-to-use self-hosted monitoring tool) and integrate with prometheus and grafana in Docker☆15May 26, 2025Updated 9 months ago
- ☆16Apr 16, 2015Updated 10 years ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- Utilities for locally running and testing Python AWS Lambda functions☆15Sep 10, 2017Updated 8 years ago
- parse Tor consensus to generate google maps and google earth KML of tor relays☆21Feb 20, 2018Updated 8 years ago
- ☆13Apr 28, 2023Updated 2 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago
- Apps for Splunk Phantom security automation | Cisco Meraki | Ansible Tower | F5 | A10☆24May 29, 2020Updated 5 years ago
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 3 months ago
- PowerShell scripts for configuring Microsoft DirectAccess☆19Mar 8, 2026Updated last week
- LogZilla NetOps Platform: Network Insight, Simplified☆21Feb 21, 2026Updated 3 weeks ago
- ☆78Mar 13, 2026Updated last week
- Split stream based on previous execution: new items, updated items, old items☆14Mar 5, 2022Updated 4 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Sep 18, 2016Updated 9 years ago
- Python API and REST API for the Checkmarx WSDL☆13Feb 11, 2016Updated 10 years ago
- Cron job scheduler for Amazon Web Services(AWS)☆14Jan 24, 2018Updated 8 years ago
- incident response scripts☆18Mar 4, 2019Updated 7 years ago