CLI program for automating the setup, configuration, and use of cybersecurity solutions
☆50Feb 12, 2023Updated 3 years ago
Alternatives and similar repositories for mutablesecurity
Users that are interested in mutablesecurity are comparing it to the libraries listed below
Sorting:
- Virtual Lab builder and player☆15Aug 25, 2021Updated 4 years ago
- A CLI tool for managing Chronicle user workflows☆18Sep 24, 2025Updated 5 months ago
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- Postfix SMTP Smuggling - Expect Script POC☆23Dec 26, 2023Updated 2 years ago
- Scripts to generate an Internet simulation☆36Aug 6, 2024Updated last year
- ☆10Apr 20, 2022Updated 3 years ago
- Run Velociraptor on Security Onion☆40Jul 27, 2022Updated 3 years ago
- A tool for extracting data from Arbor SP via its REST APIs in order to generate reports☆11Dec 19, 2022Updated 3 years ago
- Demo setup for compliance-trestle☆37Jan 28, 2026Updated last month
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆46Mar 2, 2020Updated 6 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Jun 1, 2023Updated 2 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Dec 31, 2025Updated 2 months ago
- Anime Character Segmentation☆11Aug 31, 2020Updated 5 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- This is a repo for camphish tool for kali linux develop by thelinuxchoise and techchip☆10Nov 2, 2023Updated 2 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- ☆11May 17, 2023Updated 2 years ago
- ☆12Feb 10, 2026Updated 3 weeks ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- How to create an OS from scratch☆12Jan 22, 2020Updated 6 years ago
- Diese Ablage ist die strukturierte Wissensdatenbank der Mint System GmbH.☆13Updated this week
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Nov 24, 2020Updated 5 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆20Mar 27, 2024Updated last year
- Guide to installing DCS World Standalone on linux. Mostly extracted from https://github.com/TheZoq2/dcs_on_linux?tab=readme-ov-file☆15Apr 24, 2025Updated 10 months ago
- MCP Server for Snyk Security Scanning☆15Feb 23, 2025Updated last year
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- A curated list of 150+ papers and resources on Agentic Security. Based on the survey covering the transition from passive LLMs to autonom…☆28Dec 6, 2025Updated 3 months ago
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- SparkFun Analog to Digital Stereo Converter Breakout - PCM1803A☆10Mar 9, 2015Updated 11 years ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- ☆10Apr 19, 2022Updated 3 years ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- CLI generator for Velociraptor offline collector☆16Oct 10, 2025Updated 4 months ago