Purple Team Strategies, Published by Packt
☆14Mar 2, 2026Updated last week
Alternatives and similar repositories for Purple-Team-Strategies
Users that are interested in Purple-Team-Strategies are comparing it to the libraries listed below
Sorting:
- Advanced Malware Analysis [video], published by Packt☆22Jan 24, 2023Updated 3 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Industrial Cybersecurity Second Edition, published by Packt☆34Jan 30, 2023Updated 3 years ago
- PHP技巧☆10Oct 25, 2019Updated 6 years ago
- A database schema designing tool that runs in browser.☆10Feb 17, 2025Updated last year
- Evaluate and compare SBOMs of Maven projects☆13Mar 3, 2023Updated 3 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- Mastering Malware Analysis, published by Packt☆41Jan 18, 2023Updated 3 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆37Mar 10, 2023Updated 2 years ago
- A repo to support the book☆46Jan 18, 2023Updated 3 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Demo application and tests for API Testing Summit 2021☆11Jul 10, 2021Updated 4 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- ChatGPT 101 - Supercharge Your Work & Life with ChatGPT, by packt Publishing☆14Sep 3, 2024Updated last year
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 8 months ago
- RACF Database Parser☆12Apr 4, 2024Updated last year
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- Simple smtp server in go☆11Jul 17, 2017Updated 8 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- The Complete Scrum Master Certification and Agile Scrum Course, published by Packt☆12Nov 7, 2023Updated 2 years ago
- Asciidoc template for advanced level curricula☆14Feb 23, 2026Updated 2 weeks ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- ☆15May 30, 2025Updated 9 months ago
- Unikernel applications framework☆13Jun 1, 2025Updated 9 months ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- ☆13Jun 14, 2023Updated 2 years ago
- Unit test for ACRN, including unit test cases for hypervisor and device model.☆12Sep 23, 2022Updated 3 years ago
- ☆12Sep 18, 2015Updated 10 years ago