Awesome Cyber-Security Data-sets Collection
☆22Aug 30, 2018Updated 7 years ago
Alternatives and similar repositories for Cyber-Security-Dataset-collections
Users that are interested in Cyber-Security-Dataset-collections are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- Our collection of Wazuh detection rules for our Offense Lab☆18Feb 13, 2022Updated 4 years ago
- Collection of resources for Industrial control system cybersecurity☆16May 30, 2022Updated 3 years ago
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆17Aug 31, 2018Updated 7 years ago
- Script to check ModSecurity rules agains some WAF☆12Oct 15, 2018Updated 7 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Prevent CSRF with nginx☆14Mar 6, 2019Updated 7 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- My fuzz repo!☆22Jul 28, 2023Updated 2 years ago
- ☆20Jan 20, 2023Updated 3 years ago
- ☆15Sep 21, 2020Updated 5 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- Privacy Tools by CKTN☆24Aug 14, 2022Updated 3 years ago
- Anomaly Detection Discriminative GAN (ADD-GAN)☆14Oct 9, 2017Updated 8 years ago
- ☆10Apr 30, 2017Updated 8 years ago
- SSH brute-force script created for HackTheBox☆16Mar 26, 2020Updated 5 years ago
- Steganography via adversarial training☆15Dec 1, 2018Updated 7 years ago
- Tools to integrate 2 great security tools OPNsense and Wazuh☆31Aug 26, 2021Updated 4 years ago
- ☆16Feb 13, 2018Updated 8 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆29Jul 4, 2023Updated 2 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- WordPress Optimization Solutions☆10Mar 13, 2019Updated 7 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- implementation of BiGAN model using tensorflow☆16Oct 2, 2018Updated 7 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"☆13Oct 12, 2023Updated 2 years ago
- Welcome to github repository for Visual Cloud Delivery Network. This repository will provide the Ansible playbooks for installing the com…☆22Dec 16, 2024Updated last year
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- ☆18Mar 24, 2023Updated 2 years ago
- A small bash script that allows remote oscap scanning through ssh, similar to what SCAP Workbench does.☆11Apr 18, 2015Updated 10 years ago
- Cheat sheet about stuff others might find interesting☆14Dec 10, 2021Updated 4 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- Simple classifier to classify SVHN images, based on Keras with the Tensorflow backend.☆17Feb 26, 2018Updated 8 years ago
- ☆18Feb 16, 2023Updated 3 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Scan directories, exports, and backups for sensitive data (like PII and API keys) with Nightfall's data loss prevention (DLP) APIs. Disco…☆11Mar 17, 2022Updated 4 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆12Nov 19, 2018Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago