P3tra-WP / Jupyter-ThreatView external linksLinks
☆14Dec 3, 2022Updated 3 years ago
Alternatives and similar repositories for Jupyter-Threat
Users that are interested in Jupyter-Threat are comparing it to the libraries listed below
Sorting:
- Este repositorio é apenas um exemplo de como adicionar OWASP ZAP Actions em uma pipeline de DevOps.☆19Mar 12, 2021Updated 4 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- ☆27Sep 15, 2022Updated 3 years ago
- OWASP Application Security Verification Standard 4.0 Checklist☆33Apr 15, 2019Updated 6 years ago
- IriusRisk Community☆71Sep 5, 2023Updated 2 years ago
- ☆11Mar 4, 2020Updated 5 years ago
- OSINT tool for domain discovery☆10Apr 5, 2024Updated last year
- TEAM Mentor 3.x Released Code☆16Aug 5, 2016Updated 9 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- This repo hosts Terraform code for generating and analyzing Software Bill of Materials (SBOM) for Amazon ECR images. It helps identify Am…☆16Oct 18, 2023Updated 2 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- Step template - DEPRECATED, please use the `step` plugin and its built in template instead (https://github.com/bitrise-core/bitrise-plugi…☆10Dec 1, 2023Updated 2 years ago
- Api flask, Desktop C++ e Página web em Flask☆15Apr 19, 2021Updated 4 years ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- ☆12Jul 4, 2024Updated last year
- Rubik's cube solving TensorFlow model with Lego EV3 MindCub3r robot support.☆11Sep 3, 2019Updated 6 years ago
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- Arista EOS gNMI AI Assistant☆10Dec 23, 2024Updated last year
- ☆10Mar 11, 2024Updated last year
- ☆10May 12, 2022Updated 3 years ago
- Serviço para gerar os arquivos APIX001 e APIX002 do Arranjo de Pagamentos Pix☆10Feb 11, 2023Updated 3 years ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Jan 9, 2026Updated last month
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- ☆10Mar 6, 2023Updated 2 years ago
- ☆14Feb 19, 2023Updated 2 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- Integração com banco Bradesco de remessa de cobrança online em formato JSON (.NET Framework 4.6.1)☆13Jul 25, 2022Updated 3 years ago
- Core model including reused documentation☆101Dec 16, 2025Updated 2 months ago
- This repository is related to specialized books published by the THB team.☆20Aug 13, 2025Updated 6 months ago
- A simple easy to use C# JWT Decoder☆14Dec 8, 2022Updated 3 years ago
- Material usado em apresentações☆14Nov 30, 2016Updated 9 years ago
- ☆13Jun 27, 2022Updated 3 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- Configuration Language for Mortals☆12Feb 4, 2026Updated last week
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago