☆30Apr 19, 2023Updated 2 years ago
Alternatives and similar repositories for SANS-summit
Users that are interested in SANS-summit are comparing it to the libraries listed below
Sorting:
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 10 months ago
- Apply YARA rules to your Cutter projects.☆16Jan 7, 2020Updated 6 years ago
- pocsuite3 goby plugin☆16Mar 8, 2021Updated 4 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- 一款监控端口变化的系统——beholder_scanner端☆82Jul 10, 2024Updated last year
- INACTIVE - http://mzl.la/ghe-archive - Zeek Extreme Performance Tuning☆26Oct 10, 2019Updated 6 years ago
- Learning JAVA for Security☆34Jun 9, 2022Updated 3 years ago
- Elkeid HUB is a rule/event processing engine maintained by the Elkeid Team that supports streaming/offline (not yet supported by the comm…☆103May 8, 2023Updated 2 years ago
- Python nbtstat + smb_version without third party packages☆30Jun 10, 2021Updated 4 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Jun 21, 2021Updated 4 years ago
- General Open Architecture Security Questionnaire☆31Jul 25, 2023Updated 2 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- 个人使用的一款Web CMS指纹扫描器☆25Aug 4, 2020Updated 5 years ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆76Jul 6, 2023Updated 2 years ago
- Apache CouchDB 3.2.1 - Remote Code Execution (RCE)☆29May 20, 2022Updated 3 years ago
- 基于Docker集群的分布式Openvas(GVM)。本项目包括:GVM-Docker镜像,Openvas-Scanner-Docker镜像,GVM远程调度(golang)。☆29Dec 11, 2020Updated 5 years ago
- 合规审计平台☆472Mar 23, 2022Updated 3 years ago
- Code By:Tas9er / ActiveMQ漏洞安全测试☆35Jan 27, 2021Updated 5 years ago
- Search msDS-AllowedToActOnBehalfOfOtherIdentity☆35Jan 17, 2022Updated 4 years ago
- ☆33Oct 27, 2016Updated 9 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Dependencies with Log4j2 Checklist☆35Dec 14, 2021Updated 4 years ago
- ☆37Sep 28, 2021Updated 4 years ago
- ☆37Mar 28, 2020Updated 5 years ago
- resource-based constrained delegation RBCD☆46Jan 15, 2022Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- Test cases management system☆15Dec 8, 2022Updated 3 years ago
- In order to better test for logical vulnerabilities☆14Feb 20, 2024Updated 2 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- ☆79Nov 3, 2020Updated 5 years ago
- ☆13Jan 13, 2020Updated 6 years ago
- The Software Parts (SParts) lab delivers a Sawtooth-based ledger that provides both accountability and access to the open source componen…☆12Feb 20, 2020Updated 6 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- ☆46Dec 5, 2023Updated 2 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 8 years ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆47Jun 15, 2024Updated last year
- ☆46Jun 25, 2024Updated last year