☆13May 17, 2016Updated 9 years ago
Alternatives and similar repositories for use-cases
Users that are interested in use-cases are comparing it to the libraries listed below
Sorting:
- ☆14Jan 14, 2026Updated last month
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Bro scripts for the ROCK platform. http://rocknsm.io☆34Jul 2, 2023Updated 2 years ago
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆161Jan 19, 2026Updated last month
- Tool to identify domains containing Pinyin language☆12Oct 18, 2014Updated 11 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- Example of using Gauge and OWASP ZAP for test automation☆11Jan 9, 2020Updated 6 years ago
- An ESPHome component for accepting a secret PIN over Bluetooth LE.☆11Apr 7, 2024Updated last year
- A WeChat (and Weixin) chatbot skeleton in Python with queue/delayed messages support.☆12Jan 12, 2026Updated last month
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- Expanded version of the Espressif ESP webcam☆15Oct 7, 2020Updated 5 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- ☆11May 30, 2018Updated 7 years ago
- Hardware Design for the Super Magfest 2024 Swadge☆12May 4, 2024Updated last year
- Source for the STIX Documentation site☆49Aug 23, 2021Updated 4 years ago
- STIX Visualization Tool☆110Jul 13, 2018Updated 7 years ago
- An electron desktop app to read EMV card data☆12Oct 22, 2019Updated 6 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 8 months ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- Front End for ESPEasy >>>>>>>NOT YET READY FOR PRODUCTION<<<<<<<<☆11Dec 15, 2020Updated 5 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- A common database library for managing and querying security data☆18Jan 12, 2026Updated last month
- This is a Spy Android App. This app secretly takes photos using the front camera and sends to the given email address in code.☆12Jun 24, 2022Updated 3 years ago
- A handy declarative extension for methods access control in jagi:astronomy with decorators☆11Feb 8, 2018Updated 8 years ago
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- TLS Tracing examples using eBPF against the OpenSSL Library☆15Jun 26, 2022Updated 3 years ago
- Pure Java (jsr80 usb) interface to the Cannon cameras running CHDK PTP☆15Jun 21, 2021Updated 4 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Oct 6, 2020Updated 5 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- A cryptography agnostic rolling code implementation for remote-controlled embedded application☆13Sep 11, 2020Updated 5 years ago
- ☆12Mar 19, 2024Updated last year
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago