OpenAEV Docker deployment helpers
☆28Mar 7, 2026Updated last week
Alternatives and similar repositories for docker
Users that are interested in docker are comparing it to the libraries listed below
Sorting:
- A repository dedicated to deliver a comprehensive set of tools for integration and convenient use of Kaspersky Threat Intelligence servic…☆21Mar 2, 2026Updated 2 weeks ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated 2 months ago
- ☆12Feb 19, 2026Updated last month
- Wazuh extension looking up alert data against indicators in OpenCTI threat intel☆21Feb 4, 2024Updated 2 years ago
- ☆15Aug 31, 2023Updated 2 years ago
- This repository makes it easy to run ollama and its web interface using only docker compose☆10Jun 22, 2024Updated last year
- Organizar documentos sobre OSINT feitos em pt-br☆21Dec 20, 2023Updated 2 years ago
- (Not Maintained Anymore) A brute force password recovery tool☆19Apr 3, 2025Updated 11 months ago
- ☆21Dec 22, 2021Updated 4 years ago
- ☆25Feb 7, 2026Updated last month
- OpenCTI Docker deployment helpers☆222Mar 9, 2026Updated last week
- Python API to interact with network devices using the Open Spherical Camera API☆11Feb 27, 2016Updated 10 years ago
- Xiaomi Mi8 Kali Nethunter kernel for Android 10☆16Nov 24, 2020Updated 5 years ago
- TypeDB Driver for Node.js☆31Sep 27, 2023Updated 2 years ago
- SOAPI - The OpenAPI Documentation Scanner☆39Feb 17, 2025Updated last year
- simple python script that import Tenable Nessus scan result into Atlassian Jira task☆20Oct 2, 2018Updated 7 years ago
- Latest Nessus Vulnerability Scanner☆16Dec 15, 2020Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- ☆25Feb 20, 2026Updated last month
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated 2 years ago
- ☆56Jan 22, 2025Updated last year
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.☆72Mar 13, 2026Updated last week
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Jan 4, 2025Updated last year
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- ☆19Feb 19, 2025Updated last year
- Desktop application for Path of Exile divination cards☆14Mar 10, 2026Updated last week
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 3 months ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- ☆11Feb 11, 2024Updated 2 years ago
- Captures network traffic app made in Rust.☆76Mar 6, 2026Updated 2 weeks ago
- ☆44Jul 11, 2025Updated 8 months ago
- ☆13Mar 1, 2024Updated 2 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- ☆14Feb 25, 2025Updated last year
- Open Source SIEM Stack☆141Feb 11, 2026Updated last month