Pinned Repositories
azure-docs
Open source documentation of Microsoft Azure
beats
:tropical_fish: Beats - Lightweight shippers for Elasticsearch & Logstash
blockchain-security-contacts
Directory of security contacts for blockchain companies
CCSS
The CryptoCurrency Security Standard
firmware-mod-kit
http://firmware-mod-kit.googlecode.com/svn/trunk
GRASSMARLIN
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. iadgov
GrokConstructor
Semi-automatic incremental construction and debugging of regular expressions for grok to parse logfiles for logstash http://logstash.net/ . Deployed at http://grokconstructor.appspot.com/ .
IOCs
Indicator of Compromise
LogAnalyticsExamples
Query examples using the Azure Log Analytics query language
logstash-filter-grok
patterns_path
w0lverine's Repositories
w0lverine/azure-docs
Open source documentation of Microsoft Azure
w0lverine/beats
:tropical_fish: Beats - Lightweight shippers for Elasticsearch & Logstash
w0lverine/blockchain-security-contacts
Directory of security contacts for blockchain companies
w0lverine/CCSS
The CryptoCurrency Security Standard
w0lverine/firmware-mod-kit
http://firmware-mod-kit.googlecode.com/svn/trunk
w0lverine/GRASSMARLIN
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. iadgov
w0lverine/GrokConstructor
Semi-automatic incremental construction and debugging of regular expressions for grok to parse logfiles for logstash http://logstash.net/ . Deployed at http://grokconstructor.appspot.com/ .
w0lverine/IOCs
Indicator of Compromise
w0lverine/LogAnalyticsExamples
Query examples using the Azure Log Analytics query language
w0lverine/logstash-filter-grok
patterns_path
w0lverine/logstash
logstash - transport and process your logs, events, or other data
w0lverine/metasploit-framework
Metasploit Framework
w0lverine/moloch
Moloch is an open source, large scale, full packet capturing, indexing, and database system.
w0lverine/poisontap
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
w0lverine/project-1
w0lverine/Redpoint
Digital Bond's ICS Enumeration Tools
w0lverine/regexr
RegExr is a HTML/JS based tool for creating, testing, and learning about Regular Expressions.
w0lverine/s7commwireshark
Automatically exported from http://svn.code.sf.net/p/s7commwireshark/code/trunk/
w0lverine/scadasec
w0lverine/SENAMI
Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS
w0lverine/shodan-python
The official Python library for Shodan
w0lverine/tsunami-security-scanner
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
w0lverine/wireshark
wireshark + boundary IPFIX decode patches