Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance
☆52Nov 26, 2024Updated last year
Alternatives and similar repositories for Cybersecurity-Toolkit
Users that are interested in Cybersecurity-Toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆410Jun 27, 2024Updated last year
- Learning progress in CyberTalents Blue Team Scholarship 2023. Write-ups, solutions, and notes for challenges & topics. Join my cybersecur…☆26Sep 28, 2023Updated 2 years ago
- ☆12Jun 1, 2024Updated last year
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- CyberTalents Blue Team Scholarship 2023 By Trend Micro☆12Sep 28, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- دليل الاستجابة للحوادث السيبرانية☆36Feb 7, 2021Updated 5 years ago
- Using the ProblemDetails Class in ASP.NET Core Web API☆12Apr 17, 2024Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆33Dec 12, 2025Updated 4 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- Inventory Management System☆19Jun 27, 2024Updated last year
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 11 months ago
- WordPress plugin to rename uploaded files, generate alt text, and create featured images using OpenAI (gpt-4.1-mini, gpt-image-1)☆18Feb 21, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Get user information of a Twitter user.☆21May 20, 2018Updated 7 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆48Mar 5, 2026Updated last month
- KMS VL ALL AIO☆30Jun 1, 2024Updated last year
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 5 months ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- ☆23Jan 6, 2023Updated 3 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- Some projects with demonstration of vulnerabilities☆13Nov 20, 2024Updated last year
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Proof of concept showing how to add ClamAV antivirus detection to a .NET Aspire application☆19Jul 11, 2024Updated last year
- ☆111Nov 24, 2025Updated 4 months ago
- تجربتي مع اختبار CEH☆29May 8, 2021Updated 4 years ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- NetworkAssessment: Network Compromise Assessment Tool☆94May 31, 2024Updated last year
- This firmware downgrader was not made by me. This repo is a compilation of information and software needed to downgrade to 4.31.20 for th…☆13Sep 21, 2017Updated 8 years ago
- ☆12Apr 16, 2021Updated 5 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Docker image to back up MongoDB database and upload to S3☆24Jul 1, 2025Updated 9 months ago
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 10 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- Crappy shell script that port scans using curl☆13May 3, 2017Updated 8 years ago