Technical Tabletop Exercises Simulation Framework
☆48Oct 30, 2023Updated 2 years ago
Alternatives and similar repositories for T3SF
Users that are interested in T3SF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Sep 10, 2022Updated 3 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- ☆27Jan 16, 2026Updated 2 months ago
- Repository for write-ups of Sofia Santos' OSINT exercises☆18Sep 29, 2025Updated 5 months ago
- Python command line tool used for generating GIAC Certification indexes.☆29Jul 17, 2023Updated 2 years ago
- ATTPwn☆218Mar 9, 2024Updated 2 years ago
- 🌴 The STIX2 Pattern expression parser for humans☆26Jun 29, 2019Updated 6 years ago
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 3 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- ☆20Sep 25, 2020Updated 5 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Library and tools to access the Windows SuperFetch database format☆13Nov 29, 2025Updated 3 months ago
- ☆40Nov 29, 2024Updated last year
- Collection of generic YARA rules☆16Updated this week
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- declarative web interfaces using semantic data☆32Sep 15, 2015Updated 10 years ago
- A compendium of threat modeling and security testing resources for LLMs and GenAI agents☆18Oct 16, 2024Updated last year
- ☆24Mar 12, 2025Updated last year
- CSIRT Jump Bag☆27Apr 25, 2024Updated last year
- Cyber Incident Response Team Playbook Battle Cards☆425May 10, 2024Updated last year
- A collection of cyberchef recipes for use in osint investigations☆14Jul 2, 2022Updated 3 years ago
- Python System Administration, Export list item, Sharepoint list, AD attributes, Active directory, sftp, sftp upload☆12Jul 26, 2023Updated 2 years ago
- Covert.io blog☆12Feb 3, 2024Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Python library for Adversarial ML Evaluation☆26Jul 14, 2025Updated 8 months ago
- ☆53Aug 19, 2025Updated 7 months ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆13Aug 17, 2023Updated 2 years ago
- Puppet module that hardens Windows Server to DoD STIG compliance☆14Sep 11, 2019Updated 6 years ago
- PCI-DSS toolkit to help scope web applications☆18Jun 8, 2016Updated 9 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- Convert a website to PDF using AWS lambda☆18May 3, 2022Updated 3 years ago
- LILO based Pulse Secure appliance disk image decryptor☆13Mar 20, 2024Updated 2 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆68Feb 9, 2018Updated 8 years ago
- An address book web application (Rails) that stores phone numbers, addresses, and prints mailing labels☆22Dec 14, 2022Updated 3 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- ☆11Aug 11, 2014Updated 11 years ago