ThreatTrack | Shodan + ExploitDB + GitHub + NVD
☆17Jul 16, 2024Updated last year
Alternatives and similar repositories for ThreatTrack
Users that are interested in ThreatTrack are comparing it to the libraries listed below
Sorting:
- ☆13Nov 22, 2022Updated 3 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Material do curso de Hardware Hacking da ACADITI☆23Jan 13, 2020Updated 6 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- HadoopLink是基于Hadoop及BaseMR进一步封装而来的工作 链框架。该框架省去了您生成Job,JobControl,ContrlledJob的繁杂重复代码。同时您可以非常便捷的通过注释设置MapReduce任务之间的依赖关系。HadoopLink支持多个任务链并…☆11Sep 2, 2019Updated 6 years ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 4 years ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- Hollywood-style CCTV hacking - PoC☆39May 30, 2020Updated 5 years ago
- List of sources for cybersecurity news☆41Dec 16, 2022Updated 3 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated 2 weeks ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- ☆11Feb 6, 2019Updated 7 years ago
- ☆10Jan 31, 2021Updated 5 years ago
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆11Sep 16, 2023Updated 2 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- Moonton Dump + Checker Email Password☆20Jul 18, 2021Updated 4 years ago
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Open Source Intelligence - Buscando informações sobre infraestruturas☆10Feb 13, 2019Updated 7 years ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- Gerando QRCode com Python☆10Jul 5, 2024Updated last year
- UniFi 5 Controller for Raspberry Pi☆13Jan 31, 2018Updated 8 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- UNIX sysadmin KUNG-FU.☆11Dec 19, 2025Updated 2 months ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 5 months ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Feb 26, 2022Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11May 25, 2019Updated 6 years ago
- ☆10Feb 26, 2023Updated 3 years ago
- Repo for my new website and README☆14Jan 11, 2025Updated last year
- Colored Cat is a syntax highlighter file reader.☆15Jun 21, 2024Updated last year
- Battery-free emulator of the well-known iButton key based on ATtiny13.☆16Aug 25, 2024Updated last year