This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)
☆11Feb 23, 2026Updated last month
Alternatives and similar repositories for CIST8950
Users that are interested in CIST8950 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo contains a digitized version of the course content for CYBR8470 Secure Web App Development at the University of Nebraska at Oma…☆17Nov 4, 2024Updated last year
- Toucan Design System☆11Sep 22, 2025Updated 6 months ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Automatically parse and tabulate Nessus findings into OpenDocument tables☆11Dec 15, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Test of http://www.malwaredomainlist.com/hostslist/hosts.txt☆14Updated this week
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- A collection of scripts to look various things up in VERIS data such as VCDB.☆14Apr 27, 2017Updated 8 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Practical Data Wrangling, published by Packt☆18Jan 30, 2023Updated 3 years ago
- python scripts for penetration testing☆11Oct 17, 2019Updated 6 years ago
- Docker container running cowrie with DShield output enabled.☆17Jun 8, 2016Updated 9 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆23Jan 29, 2024Updated 2 years ago
- Files used in the final project of the Google IT Automation with Python Professional Certificate☆22Sep 30, 2020Updated 5 years ago
- Build security program documentation using Git and Markdown☆28Jan 26, 2026Updated 2 months ago
- Running Ubuntu or Debian Linux on the Western Digital WD Sentinel DX4000☆39Oct 5, 2025Updated 5 months ago
- A curated list of free Credly badges 🏆🏅 500+ free courses and certifications🎖️🥇 Learn new skills from 50+ organizations, earn verifia…☆109Mar 10, 2026Updated 2 weeks ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Sep 3, 2016Updated 9 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Jul 24, 2015Updated 10 years ago
- Code shown in the videos for the Google IT Automation with Python Professional Certificate☆18Oct 1, 2020Updated 5 years ago
- CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to dete…☆20Apr 19, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆48Mar 17, 2026Updated last week
- ☆23Jun 24, 2021Updated 4 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆24May 8, 2018Updated 7 years ago
- Powershell SMBv3 Compression checker☆28Apr 1, 2023Updated 2 years ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- The simple pricing calculator and comparison tool for the cloud databases.☆83May 21, 2025Updated 10 months ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- R package for working with VERIS data☆25Aug 4, 2023Updated 2 years ago
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Dec 12, 2024Updated last year
- Advanced, Light Weight & Extremely Fast MD5 Cracker/Decoder/Decryptor written in Python 3☆25Jan 10, 2021Updated 5 years ago
- medium-rare☆28Nov 21, 2019Updated 6 years ago
- open source software for journalists to investigate all of the data in the BlueLeaks dataset☆34Mar 13, 2026Updated last week
- Continuous Audit Metrics☆27Jun 5, 2024Updated last year
- OpenSSF Endusers Working Group☆28Mar 21, 2024Updated 2 years ago
- Automated Enumeration Script for Pentesting☆34Aug 14, 2020Updated 5 years ago