My notes on various topics
☆68Oct 20, 2023Updated 2 years ago
Alternatives and similar repositories for Notes
Users that are interested in Notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Oct 16, 2017Updated 8 years ago
- 第二届阿里云安全算法挑战赛☆16May 11, 2018Updated 7 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- ☆14Feb 7, 2019Updated 7 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆18May 31, 2022Updated 3 years ago
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆32Jan 28, 2020Updated 6 years ago
- A kinda reckless dns resolver. Still under development.☆16Mar 23, 2020Updated 6 years ago
- Purple Team Security☆75Mar 24, 2022Updated 4 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Dec 24, 2020Updated 5 years ago
- POC for utilizing wikipedia API for Command and Control☆29Dec 8, 2022Updated 3 years ago
- Script to create MITRE ATT&CK Navigator layers from the annotated detection rules in Elastic Security (Kibana).☆20Jul 1, 2023Updated 2 years ago
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17Sep 9, 2020Updated 5 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Nov 19, 2020Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- testing123☆14Nov 23, 2024Updated last year
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆40May 21, 2021Updated 4 years ago
- Extract metadata (EXIF) from uploaded files on Slack☆15Mar 2, 2017Updated 9 years ago
- Generate text and predict next word for an initial piece of text using RNNs and LSTMs☆11Jun 27, 2017Updated 8 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- Open-source framework to detect outliers in Elasticsearch events☆205May 22, 2023Updated 2 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Oct 7, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆24Mar 26, 2017Updated 9 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆251Jul 19, 2021Updated 4 years ago
- Large-scale Machine Learning using Apache Spark☆15May 6, 2019Updated 6 years ago