Alex G's starred repositories

detection-and-response-pipeline

โœจ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The purpose is to create a reference hub for designing effective threat detection and response pipelines. ๐Ÿ‘ท ๐Ÿ—

Stargazers:239Issues:0Issues:0

pi-hole

pi-hole setup on portainer

Stargazers:10Issues:0Issues:0

FalconBMS-Alternative-Launcher

Configure and save FalconBMS setup per Joysticks.

Language:C#License:NOASSERTIONStargazers:130Issues:0Issues:0

reflex

๐Ÿ•ธ๏ธ Web apps in pure Python ๐Ÿ

Language:PythonLicense:Apache-2.0Stargazers:18762Issues:0Issues:0

aws-secret-sidecar-injector

Kubernetes mutating webhook to fetch secrets from AWS Secrets Manager

Language:GoLicense:MIT-0Stargazers:145Issues:0Issues:0

vulnerable-code-snippets

Twitter vulnerable snippets

Language:PHPStargazers:887Issues:0Issues:0

go-coffeeshop

โ˜• A practical event-driven microservices demo built with Golang. Nomad, Consul Connect, Vault, and Terraform for deployment

Language:GoLicense:MITStargazers:4056Issues:0Issues:0

osquery

SQL powered operating system instrumentation, monitoring, and analytics.

Language:C++License:NOASSERTIONStargazers:21612Issues:0Issues:0

kubernetes-the-hard-way

Bootstrap Kubernetes the hard way. No scripts.

License:Apache-2.0Stargazers:40212Issues:0Issues:0

suricata-language-server

Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and auto-completion to your preferred editor once it is configured.

Language:PythonLicense:GPL-3.0Stargazers:60Issues:0Issues:0
Language:YARALicense:Apache-2.0Stargazers:518Issues:0Issues:0

suricata-4-analysts

The Security Analystโ€™s Guide to Suricata

Language:PythonLicense:CC-BY-SA-4.0Stargazers:49Issues:0Issues:0

SublimePrettyJson

Prettify/Minify/Query/Goto/Validate/Lint JSON plugin for Sublime Text 3 & 4

Language:PythonLicense:MITStargazers:2022Issues:0Issues:0

evilscan

NodeJS Simple Network Scanner

Language:JavaScriptLicense:MITStargazers:546Issues:0Issues:0

zui

Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.

Language:TypeScriptLicense:NOASSERTIONStargazers:1770Issues:0Issues:0

MHDDoS

Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods

Language:PythonLicense:MITStargazers:12333Issues:0Issues:0
Language:ShellLicense:MIT-0Stargazers:20Issues:0Issues:0

TripleCross

A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.

Language:CLicense:GPL-3.0Stargazers:1746Issues:0Issues:0

effective_pandas_book

Errata and code for Effective Pandas book

Language:Jupyter NotebookStargazers:342Issues:0Issues:0

medusa

A fast and secure multi protocol honeypot.

Language:RustLicense:NOASSERTIONStargazers:302Issues:0Issues:0

honeyup

An uploader honeypot designed to look like poor website security.

Language:RustLicense:GPL-3.0Stargazers:25Issues:0Issues:0

90DaysOfDevOps

This repository started out as a learning in public project for myself and has now become a structured learning map for many in the community. We have 3 years under our belt covering all things DevOps, including Principles, Processes, Tooling and Use Cases surrounding this vast topic.

Language:ShellLicense:NOASSERTIONStargazers:26296Issues:0Issues:0

malicious-pdf

๐Ÿ’€ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

Language:PythonLicense:BSD-2-ClauseStargazers:2801Issues:0Issues:0

vulhub

Pre-Built Vulnerable Environments Based on Docker-Compose

Language:DockerfileLicense:MITStargazers:17299Issues:0Issues:0

EvilSelenium

EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.

Language:C#Stargazers:586Issues:0Issues:0

SecLists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

Language:PHPLicense:MITStargazers:56368Issues:0Issues:0

BloodHound

Six Degrees of Domain Admin

Language:PowerShellLicense:GPL-3.0Stargazers:9664Issues:0Issues:0

ScheduleRunner

A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation

Language:C#Stargazers:316Issues:0Issues:0

caldera

Automated Adversary Emulation Platform

Language:PythonLicense:Apache-2.0Stargazers:5440Issues:0Issues:0