ItsDrTsach / together-we-strong-c4sLinks
good sum up... i recommend printing and working with it nearby you
☆13Updated 3 years ago
Alternatives and similar repositories for together-we-strong-c4s
Users that are interested in together-we-strong-c4s are comparing it to the libraries listed below
Sorting:
- How to continuously deploy a Full Stack React +Node.js +MySql App to Google Cloud Compute Engine☆20Updated 4 years ago
- Cyber Threat Intelligence Challenge By IntSights. Scraping, analysis and presentation platform to one of the most hideous places on the …☆27Updated 4 years ago
- ☆17Updated 6 months ago
- ☆10Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆32Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- ☆22Updated last year
- Go module that returns supported regions for a service or supported services for a region☆16Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated this week
- A collection of cyberchef recipes for use in osint investigations☆13Updated 3 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 8 years ago
- ☆12Updated 2 years ago
- Guidelines for writing secure code for Python developers.☆21Updated 8 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- ATHI — An AI Threat Modeling Framework for Policymakers☆56Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 7 months ago
- Helm chart for Trend Micro Cloud One Container Security☆20Updated last month
- A Python Typer-based CLI tool to generate fake data for Azure AD. AzDummy also uses Rich for some dope console output.☆13Updated 4 years ago
- ☆19Updated last year
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Updated 5 years ago
- Short deep dive into Threat Hunting on AWS☆13Updated last year
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- python 2 arp poisonner☆16Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Various components we use in labs☆10Updated 4 years ago
- Python command line tool used for generating GIAC Certification indexes.☆27Updated 2 years ago
- Recent cyber attacks reports & interesting analysis files☆15Updated 3 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Import AbuseCH IOC Feeds into MISP☆12Updated 4 years ago