NICE Challenges walk-throughs
☆11Nov 25, 2022Updated 3 years ago
Alternatives and similar repositories for NICE
Users that are interested in NICE are comparing it to the libraries listed below
Sorting:
- List of tools and references used by NU Cybersecurity students,☆15Feb 12, 2024Updated 2 years ago
- GPT (Goru Party T-shirt) is a platform for IUT CSE-19 students to choose each others' nickname for Goru Party.☆15May 2, 2024Updated last year
- Protect domains from malicious browser extensions☆17Apr 16, 2025Updated 10 months ago
- When testing a network code key, the baseband firmware reads the encryptedSignature, calculates the deviceKey and the nckKey from the ent…☆20May 16, 2012Updated 13 years ago
- This guide will teach you how to download and install i4Tools on your Windows, Linux, and MAC PC. We will also cover installing AsTools f…☆22Nov 12, 2024Updated last year
- Scripts for automating infrastructure setup with AWS Lightsail☆17May 16, 2019Updated 6 years ago
- Hardening Scripts CIS Benchmark☆78Apr 4, 2019Updated 6 years ago
- Collection of batch scripts to change the appearance of the Windows 8+ user interface. An extension of the .theme ini files.☆29Aug 4, 2025Updated 6 months ago
- Ultimate Applocker Hardening Configuration Script.☆35Jul 26, 2024Updated last year
- Dnsmasq configuration files to stop tracking and advertisements, especially on mobile applications☆27Updated this week
- Login through Duo Mobile in your browser☆54Jan 25, 2026Updated last month
- Archive of my old notes from IUT courses.☆63Dec 27, 2024Updated last year
- Credential Provider for MFA at the Windows Login with privacyIDEA☆78Updated this week
- Automated CIS Benchmark Compliance Remediation for Windows Server 2022 with Ansible☆108Sep 17, 2025Updated 5 months ago
- FBPro Audit Test Automation Package allows you to create compliance reports for your systems. The resulting HTML-reports provide a transp…☆162Updated this week
- Anaconda.org client and CLI☆161Updated this week
- Security hardening content for VMware solutions to US Department of Defense standards☆189Updated this week
- ADAPT is a tool that performs automated Penetration Testing for WebApps.☆193Sep 24, 2019Updated 6 years ago
- Create a compliant and secure Windows 10/11 system with our Gold Master image creation tool. Adhere to DoD STIG/SRG Requirements and NSA …☆187Jul 26, 2024Updated last year
- A comprehensive guide for enhancing security and privacy on iOS and iPadOS devices.☆280Nov 21, 2024Updated last year
- Burp Suite Logger++: Log activities of all the tools in Burp Suite☆190Jun 12, 2024Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Jul 21, 2022Updated 3 years ago
- Web Application Security Testing Tools☆252Mar 13, 2024Updated last year
- ☆331Apr 24, 2025Updated 10 months ago
- Scripts and tools for use with Microsoft products/technologies☆281Sep 24, 2025Updated 5 months ago
- Conversion tool used to Convert Group Policy baselines into DSC☆272Aug 5, 2021Updated 4 years ago
- Simple command line tool to check for compliance against CIS Benchmarks☆272May 3, 2024Updated last year
- Omnisci3nt is an open-source web reconnaissance and intelligence tool for extracting deep technical insights from domains, including subd…☆336Jan 6, 2026Updated last month
- Now achieve MacOS look on your windows 11 desktop.☆372Feb 1, 2024Updated 2 years ago
- A basic app to track your car's maintenance. Open source for Hacktoberfest 2025. Beginners are welcome!☆325Feb 12, 2026Updated 2 weeks ago
- Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security re…☆382Oct 25, 2025Updated 4 months ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆467Updated this week
- Troubleshooting Tool with Windows Updates (Developed in Dev-C++).☆511Jan 16, 2026Updated last month
- Password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cra…☆620Feb 1, 2026Updated last month
- A repository of tools for pentesting of restricted and isolated environments.☆587Oct 26, 2021Updated 4 years ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆672Updated this week
- Checklist of the most important security countermeasures when designing, creating, testing your web/mobile application☆644Apr 10, 2020Updated 5 years ago
- Browser extension that strips Google Analytics (UTM) parameters, and various other click tracking tokens, from URL query strings☆747Sep 29, 2025Updated 5 months ago
- AI Browser Automation☆1,081Feb 14, 2026Updated 2 weeks ago