Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.
☆13Mar 26, 2018Updated 7 years ago
Alternatives and similar repositories for WEF-handbook-appendix
Users that are interested in WEF-handbook-appendix are comparing it to the libraries listed below
Sorting:
- Home Assistant + EcoDesign Brauchwasserwärmepumpe☆12Feb 23, 2026Updated 3 weeks ago
- Cert Michelin Awareness Card Game repository☆15Dec 10, 2017Updated 8 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- Full Packet Capture for the Masses☆14Sep 13, 2018Updated 7 years ago
- Please see other maintained fork:☆17Dec 4, 2025Updated 3 months ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- Stop searching for sample hashes on 10 different sites.☆66May 31, 2018Updated 7 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- PyData Boston 2013 talks: "Intro to scikit-learn" & "Realtime Predictive Analytics: Using scikit-learn and RabbitMQ"☆11Jan 5, 2014Updated 12 years ago
- Datalake CLI scripts and python library for searching, lookuping, adding, tagging, editing score of threats in bulk☆22Feb 20, 2026Updated last month
- ☆11Mar 3, 2026Updated 2 weeks ago
- ☆34Jan 22, 2025Updated last year
- Machine Learning for malicious Javascript code detection☆19Jan 13, 2017Updated 9 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Tools and cheat sheet for Eclipse Phase, 2nd Edition☆16May 19, 2019Updated 6 years ago
- Official Elastic Skills☆80Updated this week
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆64Dec 18, 2023Updated 2 years ago
- ☆38Aug 22, 2018Updated 7 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Parses IE's Automatic Crash Recovery Files☆16Feb 3, 2017Updated 9 years ago
- Malware Configuration And Payload Extraction☆20Feb 12, 2020Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Material for a course on applied machine-learning for scientists. Taught at EPFL in spring 2018.☆11May 3, 2018Updated 7 years ago
- KERnano: The No-install Python Pen Testing kit. (Windows & Linux)☆13Sep 2, 2022Updated 3 years ago
- Slides and code for "Validating Models in R" Strata 2016 RDay http://conferences.oreilly.com/strata/hadoop-big-data-ca/public/schedule/de…☆10Jun 22, 2020Updated 5 years ago
- Slides, Code, and Exercises to support [R Quickstart tutorial](http://conferences.oreilly.com/strata/hadoop-big-data-ca/public/schedule/d…☆10Mar 25, 2016Updated 9 years ago
- Nagios/Icinga Plugin for Palo Alto Firewall Systems☆15Oct 25, 2019Updated 6 years ago
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- A lecture I gave at PyData NYC 2012 on using the networkx python library and Gephi to generate a mapping of the python community on Twitt…☆28Dec 6, 2012Updated 13 years ago
- A personal document with reports, analysis, and plotting of personal analytics data using R.☆13Jul 28, 2016Updated 9 years ago
- Westermo DHCP Relay Agent with Option 82 support☆15Jul 31, 2020Updated 5 years ago
- Everyday Analytics and Visualization - JuliaCon 2015☆10Sep 25, 2015Updated 10 years ago