zet694 / promitheus_monitoring
Docker Swarm - Promitheus, Grafana, Node Exporter, Loki, Promtail, Caddy
☆29Updated 4 years ago
Alternatives and similar repositories for promitheus_monitoring:
Users that are interested in promitheus_monitoring are comparing it to the libraries listed below
- Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts☆26Updated 5 years ago
- Scripts to automate standing up hosts in Linode☆15Updated 4 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated 4 months ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Unified interface for some crypto algos☆12Updated last week
- Example of Kerberoasting Honeypot☆16Updated 2 years ago
- autopwn rdp servers☆8Updated 6 years ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18Updated last year
- Active Directory Password Spray Testing Utility in Go☆16Updated last year
- Apfell implant written in C#.☆8Updated 4 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- parsers to make life easier☆12Updated 4 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- Kibana app for RedELK☆16Updated 2 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- Hacky linux memory probe. Yara or Regex scan process memory☆11Updated last year
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- ☆11Updated 3 years ago
- Python script for privilege escalation for Python☆11Updated 4 years ago
- SonicWall VPN-SSL Exploit* using Golang ( * and other targets vulnerable to shellshock ).☆18Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Scans an internal network using massscan and nmap☆20Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Repository to track keywords & patterns lists used by crowdsec parsers and scenarios☆12Updated this week
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year