MLHale / CIST8950View external linksLinks
This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)
☆11Jan 26, 2026Updated 2 weeks ago
Alternatives and similar repositories for CIST8950
Users that are interested in CIST8950 are comparing it to the libraries listed below
Sorting:
- This repo contains a digitized version of the course content for CYBR8470 Secure Web App Development at the University of Nebraska at Oma…☆17Nov 4, 2024Updated last year
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated last year
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Toucan Design System☆10Sep 22, 2025Updated 4 months ago
- Automatically parse and tabulate Nessus findings into OpenDocument tables☆11Dec 15, 2015Updated 10 years ago
- A collection of scripts to look various things up in VERIS data such as VCDB.☆14Apr 27, 2017Updated 8 years ago
- Test of http://www.malwaredomainlist.com/hostslist/hosts.txt☆14Updated this week
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- python scripts for penetration testing☆11Oct 17, 2019Updated 6 years ago
- Docker container running cowrie with DShield output enabled.☆17Jun 8, 2016Updated 9 years ago
- Practical Data Wrangling, published by Packt☆18Jan 30, 2023Updated 3 years ago
- Files used in the final project of the Google IT Automation with Python Professional Certificate☆22Sep 30, 2020Updated 5 years ago
- Build security program documentation using Git and Markdown☆25Jan 26, 2026Updated 2 weeks ago
- Code shown in the videos for the Google IT Automation with Python Professional Certificate☆18Oct 1, 2020Updated 5 years ago
- ☆21Jan 29, 2024Updated 2 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Continuous Audit Metrics☆27Jun 5, 2024Updated last year
- R package for working with VERIS data☆25Aug 4, 2023Updated 2 years ago
- CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to dete…☆21Apr 19, 2023Updated 2 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Jul 24, 2015Updated 10 years ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Sep 3, 2016Updated 9 years ago
- ☆23Jun 24, 2021Updated 4 years ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23May 8, 2018Updated 7 years ago
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- open source software for journalists to investigate all of the data in the BlueLeaks dataset☆33Jan 19, 2026Updated 3 weeks ago
- OpenSSF Endusers Working Group☆28Mar 21, 2024Updated last year
- DPE - Default Password Enumeration☆36Jun 3, 2013Updated 12 years ago
- Powershell SMBv3 Compression checker☆28Apr 1, 2023Updated 2 years ago
- Advanced, Light Weight & Extremely Fast MD5 Cracker/Decoder/Decryptor written in Python 3☆25Jan 10, 2021Updated 5 years ago
- A curated list of free Credly badges 🏆🏅 500+ free courses and certifications🎖️🥇 Learn new skills from 50+ organizations, earn verifia…☆74Dec 8, 2025Updated 2 months ago
- Automated Enumeration Script for Pentesting☆34Aug 14, 2020Updated 5 years ago
- Running Ubuntu or Debian Linux on the Western Digital WD Sentinel DX4000☆38Oct 5, 2025Updated 4 months ago
- medium-rare☆28Nov 21, 2019Updated 6 years ago
- List of Azure Portals☆31Sep 23, 2019Updated 6 years ago
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆45Oct 1, 2025Updated 4 months ago
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆40Sep 22, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago