Repo Filled With Follow Along Guides
☆80Jun 8, 2022Updated 3 years ago
Alternatives and similar repositories for Demos
Users that are interested in Demos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆32Dec 12, 2021Updated 4 years ago
- minio-backup-s3 - is a service giving you ability to mirror entities from SOURCE OBJECT STORAGE to DESTINATION OBJECT STORAGE.☆10Sep 13, 2020Updated 5 years ago
- Template responsivo para Captive Portal do Pfsense☆14May 14, 2016Updated 9 years ago
- Packer stuff to build a pfSense vagrant box.☆14Jul 7, 2017Updated 8 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- Fork of OpenSearch Dashboards Security Plugin.☆12Updated this week
- A repository containing helm charts for a microservice example application☆10Oct 4, 2022Updated 3 years ago
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- ☆18Oct 20, 2021Updated 4 years ago
- ☆16Feb 12, 2026Updated last month
- A base template for flask app with all the css files included for twitter bootstrap, also included a wsgi file for deployment to a apache…☆17Mar 4, 2019Updated 7 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆59Jun 11, 2019Updated 6 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆17Dec 15, 2025Updated 3 months ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,254Mar 11, 2026Updated last week
- A configuration to allow Wazuh to communicate with ChatGPT, based on https://loggar.hashnode.dev/augmenting-wazuh-with-chatgpt-integratio…☆24Mar 20, 2023Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆74Sep 13, 2025Updated 6 months ago
- Threat Hunting queries of multiple platforms☆64Feb 26, 2026Updated 3 weeks ago
- Other tools developed by CIRT.net☆24Aug 2, 2020Updated 5 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- ☆20May 10, 2023Updated 2 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆166Jul 11, 2022Updated 3 years ago
- ☆13Jun 26, 2022Updated 3 years ago
- this repo is for red team process and tools collection☆29Aug 29, 2021Updated 4 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆43Oct 30, 2024Updated last year
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- SOCFortress CoPilot☆446Updated this week
- not an exploit or a poc☆16Apr 15, 2022Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166☆19Nov 4, 2021Updated 4 years ago
- Ansible role to install Teleport Node Role☆18Jan 28, 2025Updated last year
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- Quick and dirty script to parse bplists with Ruby☆14Oct 29, 2020Updated 5 years ago
- Git repo to unify JWT/OIDC vault auth terraform projects☆13Feb 16, 2022Updated 4 years ago
- A trimmed down sane API for using ZkTeco fingerprint reader usb devices☆13Nov 20, 2023Updated 2 years ago