☆23Jun 1, 2022Updated 3 years ago
Alternatives and similar repositories for MindMaps
Users that are interested in MindMaps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SQL, IIS, Oh My...☆21Feb 24, 2025Updated last year
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆21Oct 2, 2020Updated 5 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- Carbon Black TAU Excel 4 Macro Analysis☆44Feb 8, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- scripts and configs from .conf2016 talk on Hunting the Known Unknowns PowerShell Edition☆15Oct 25, 2016Updated 9 years ago
- ☆21Nov 7, 2023Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆90Mar 20, 2026Updated last month
- Resources from B-Sides Bloomington OSINT Workshop☆13Sep 14, 2024Updated last year
- ☆33Feb 26, 2022Updated 4 years ago
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- ☆27Feb 5, 2024Updated 2 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A repository that maps API calls to Sysmon Event ID's.☆121Nov 14, 2022Updated 3 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆53Jan 28, 2026Updated 3 months ago
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Kostenlose Prozessbeschreibungen☆12Jul 4, 2024Updated last year
- Threat Hunting & Incident Investigation with Osquery☆217Mar 30, 2022Updated 4 years ago
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆14Apr 23, 2026Updated 2 weeks ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 11 months ago
- Security even with a small budget - there is no excuse!☆20May 24, 2023Updated 2 years ago
- ☆15Sep 24, 2024Updated last year
- ☆65Jul 3, 2024Updated last year
- An RSS reader built with Rust, Go and Typescript☆10Nov 15, 2025Updated 5 months ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆42May 14, 2025Updated 11 months ago
- MongoDB CVE-2025-14847 Heap Memory Leak Scanner | OP_COMPRESSED zlib Vulnerability | Bug Bounty & Red Team Tool☆36Dec 28, 2025Updated 4 months ago
- Collection of slides for security presentations I've given in various forums☆14Mar 21, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 5 years ago
- Use PowerShell DSC resources as imperative functions.☆11Sep 30, 2017Updated 8 years ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Set of PoC to abuse Windows minifilters functionality☆76May 1, 2026Updated last week
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago