Scripts that cover the basics of interacting with the Threat Grid API
☆11Jan 21, 2020Updated 6 years ago
Alternatives and similar repositories for tg-01-basics
Users that are interested in tg-01-basics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat Response API Module☆10Oct 4, 2023Updated 2 years ago
- Docker Container deployment of TIG stack with Cisco MDT inputs prepped for Telegraf☆13Mar 11, 2023Updated 3 years ago
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆10Sep 24, 2020Updated 5 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- ☆12Dec 8, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Sample code for a Cisco DNA Center Webhook Receiver☆13Apr 12, 2023Updated 3 years ago
- Test framework for gNMI☆15Oct 14, 2021Updated 4 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Zero-Touch Provisioning (ZTP) Server for Cisco Network Devices☆17Dec 8, 2022Updated 3 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Helm chart for Trend Micro Cloud One Container Security☆20Oct 28, 2025Updated 5 months ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Guard Duty Threat Feed: Automatically keeps FIRE_EYE feeds updated☆17Aug 17, 2018Updated 7 years ago
- Identity PSK (IPSK) Manager for Cisco ISE provides an example of how to manage the full Life Cycle of Wi-Fi Pre Shared Keys for supported…☆40Feb 7, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- The golden AMI pipeline enables creation, distribution, verification, launch-compliance, and decommissioning of the golden AMI out of the…☆11Jan 8, 2020Updated 6 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- Automated CIS Benchmark Compliance Remediation for Debian 11 with Ansible☆27Apr 8, 2026Updated last week
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Dec 21, 2022Updated 3 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- cisco-ios-xe-programmability-lab☆21Jun 20, 2021Updated 4 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- NETCONF Diff Engine☆26Updated this week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Disk Image Mounting Script☆11Jan 22, 2026Updated 2 months ago
- Script which activate Windows 10 & Office automatically.☆15Jun 30, 2021Updated 4 years ago
- ZIP 💣 httpd. Just a gift for scanners and bots.☆21Jul 13, 2017Updated 8 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆23Sep 4, 2018Updated 7 years ago
- Docker container of SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3☆10Oct 9, 2016Updated 9 years ago
- A simple, pure JavaScript implementation decoding PowerShell's SecureString objects for analysis.☆30Mar 31, 2023Updated 3 years ago
- Super Nes ROM Reverse engineering / WinForm C#☆18Mar 9, 2026Updated last month
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- Cisco Secure Firewall Threat Defense Virtual | Autoscale | Cluster | More . . .☆23Feb 11, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- Diaphora, a Free and Open Source program diffing tool☆23Aug 5, 2019Updated 6 years ago
- Logged PS Remote Command Wrapper for Blue Team Forensics/IR☆11Apr 12, 2018Updated 8 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Apr 9, 2026Updated last week
- Hansel - a simple but flexible search for IDA☆26Jul 11, 2019Updated 6 years ago
- REST API for retrieving Urban Dictionary's word of the day.☆15Oct 22, 2020Updated 5 years ago
- Safe Deployments with AWS Lambda☆22Oct 5, 2020Updated 5 years ago