This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)
☆11Apr 6, 2026Updated 3 weeks ago
Alternatives and similar repositories for CIST8950
Users that are interested in CIST8950 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo contains a digitized version of the course content for CYBR8470 Secure Web App Development at the University of Nebraska at Oma…☆17Nov 4, 2024Updated last year
- Toucan Design System☆11Sep 22, 2025Updated 7 months ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Automatically parse and tabulate Nessus findings into OpenDocument tables☆11Dec 15, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Test of http://www.malwaredomainlist.com/hostslist/hosts.txt☆14Updated this week
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- A collection of scripts to look various things up in VERIS data such as VCDB.☆14Apr 27, 2017Updated 9 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Practical Data Wrangling, published by Packt☆18Jan 30, 2023Updated 3 years ago
- python scripts for penetration testing☆11Oct 17, 2019Updated 6 years ago
- Docker container running cowrie with DShield output enabled.☆17Jun 8, 2016Updated 9 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆23Jan 29, 2024Updated 2 years ago
- Files used in the final project of the Google IT Automation with Python Professional Certificate☆22Sep 30, 2020Updated 5 years ago
- Build security program documentation using Git and Markdown☆28Jan 26, 2026Updated 3 months ago
- Running Ubuntu or Debian Linux on the Western Digital WD Sentinel DX4000☆38Oct 5, 2025Updated 7 months ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Sep 3, 2016Updated 9 years ago
- A curated list of free Credly badges 🏆🏅 500+ free courses and certifications🎖️🥇 Learn new skills from 50+ organizations, earn verifia…☆135Apr 16, 2026Updated 2 weeks ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Jul 24, 2015Updated 10 years ago
- Code shown in the videos for the Google IT Automation with Python Professional Certificate☆18Oct 1, 2020Updated 5 years ago
- CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to dete…☆20Apr 19, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆49Updated this week
- ☆23Jun 24, 2021Updated 4 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆24May 8, 2018Updated 7 years ago
- Powershell SMBv3 Compression checker☆28Apr 1, 2023Updated 3 years ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- The simple pricing calculator and comparison tool for the cloud databases.☆85May 21, 2025Updated 11 months ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- R package for working with VERIS data☆26Aug 4, 2023Updated 2 years ago
- Threat Modeling Manifesto☆31Jul 18, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Dec 12, 2024Updated last year
- Advanced, Light Weight & Extremely Fast MD5 Cracker/Decoder/Decryptor written in Python 3☆25Jan 10, 2021Updated 5 years ago
- medium-rare☆28Nov 21, 2019Updated 6 years ago
- open source software for journalists to investigate all of the data in the BlueLeaks dataset☆35Apr 27, 2026Updated last week
- Continuous Audit Metrics☆28Jun 5, 2024Updated last year
- OpenSSF Endusers Working Group☆28Mar 21, 2024Updated 2 years ago
- Automated Enumeration Script for Pentesting☆34Aug 14, 2020Updated 5 years ago