Credit: https://github.com/gto76/python-cheatsheet
☆19Jul 19, 2019Updated 6 years ago
Alternatives and similar repositories for PythonChat
Users that are interested in PythonChat are comparing it to the libraries listed below
Sorting:
- ☆15Mar 12, 2025Updated 11 months ago
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆29Feb 6, 2026Updated last month
- Generate Indexes from SANS PDFs☆18Jun 3, 2024Updated last year
- Deep Packet Inspection • Traffic Forensics • Network Threat Detection☆49Feb 20, 2026Updated 2 weeks ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- MineMeld nodes for MISP☆19Jan 23, 2024Updated 2 years ago
- ☆22Jan 5, 2026Updated 2 months ago
- ☆26Jun 1, 2020Updated 5 years ago
- ☆62Feb 28, 2026Updated last week
- Open-source GRC platform for modern security teams. Manage compliance (SOC 2, ISO 27001, HIPAA), risk registers, vendor assessments, and …☆89Updated this week
- 自动交易通达信版☆29Oct 18, 2015Updated 10 years ago
- ☆53Mar 1, 2026Updated last week
- ☆46Jul 9, 2024Updated last year
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆58Jun 7, 2022Updated 3 years ago
- RBA is Splunk's method to aggregate low-fidelity security events as interesting observations tagged with security metadata to create high…☆63Mar 2, 2026Updated last week
- Practical Threat Detection Engineering, Published by Packt☆87Mar 2, 2026Updated last week
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆124Feb 21, 2025Updated last year
- My notes of Ricequant☆87Oct 15, 2020Updated 5 years ago
- A starter pack of resources to help you get started in Detection Engineering.☆182Jan 17, 2026Updated last month
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- SpiderAdmin 一个集爬虫Scrapy+Scrapyd爬虫项目查看 和 爬虫任务定时调度的可视化管理工具☆96Jan 27, 2021Updated 5 years ago
- Notes on responding to security breaches relating to Azure AD☆121Mar 14, 2022Updated 3 years ago
- The default package source of the Zeek Package Manager. Wrote a package? See the README for how to get it included.☆143Updated this week
- Engine of MineMeld☆140Feb 15, 2023Updated 3 years ago
- A curated list of KAPE-related resources☆182May 1, 2025Updated 10 months ago
- Basic template for managing Backtrader backtests.☆185Dec 13, 2021Updated 4 years ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆222Oct 26, 2025Updated 4 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆275May 10, 2025Updated 9 months ago
- ☆221May 9, 2024Updated last year
- 根据北向和主力资金的行为分析和预测后市股票的涨跌☆208Jun 1, 2021Updated 4 years ago
- Implementation of Statistical Learning Method, Second Edition.《统计学习方法》第二版,算法实现。☆861Feb 9, 2021Updated 5 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆275Updated this week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆277Jun 13, 2025Updated 8 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆303Updated this week
- Hack The Box CPTS, CWES, CDSA, CWEE, CAPE, CJCA Exam and Lab Reporting / Note-Taking Tool☆341Jan 30, 2026Updated last month
- Python学习第三方库案例总结☆260Oct 1, 2020Updated 5 years ago
- Adaptive Computation Time algorithm in Tensorflow☆260Apr 5, 2017Updated 8 years ago