security course list
☆14Sep 18, 2015Updated 10 years ago
Alternatives and similar repositories for sec-course
Users that are interested in sec-course are comparing it to the libraries listed below
Sorting:
- Curated list of public penetration testing reports released by several consulting firms☆12Aug 18, 2016Updated 9 years ago
- drops.wooyun.org 乌云Drops文章备份☆30Aug 4, 2016Updated 9 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- 内网渗透脚本☆72Mar 31, 2017Updated 8 years ago
- This is a webshell open source project☆29Oct 19, 2015Updated 10 years ago
- Threat Research Blog 威胁情报提取与溯源技术研究小组☆31May 2, 2018Updated 7 years ago
- 各种漏洞poc、Exp的收集或编写☆55Jul 1, 2016Updated 9 years ago
- 收集各种各样的exp☆28Aug 20, 2015Updated 10 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后门扫描…☆14Aug 29, 2015Updated 10 years ago
- 新一代Webshell扫描工具☆49Mar 13, 2016Updated 10 years ago
- 采集乌云已确认漏洞和已公开漏洞的状态、厂商、Rank等数据用于分析哪些是良心厂商☆14Jan 3, 2017Updated 9 years ago
- IOT Research Blog 物联网安全技术研究小组☆51Jun 20, 2018Updated 7 years ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- Honeypot Research Blog 蜜罐技术研究小组☆95Jun 10, 2018Updated 7 years ago
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- 黑客相关的电视剧/电影/纪录片☆305Sep 25, 2017Updated 8 years ago
- 前端信息安全☆10Nov 8, 2017Updated 8 years ago
- CTF 题目列表☆78Dec 7, 2023Updated 2 years ago
- 《安全档案》信息安全技术期刊☆11Mar 30, 2019Updated 6 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- The plugin allows you to hide and show comments, and saves them to a specified folder.☆14Apr 10, 2025Updated 11 months ago
- 用于还原svn仓库,支持1.6,1.7☆26Jun 3, 2016Updated 9 years ago
- Few-Shot Relation Extraction with AllenNLP☆12Jan 27, 2019Updated 7 years ago
- Extract cyber security entities from unstructured text☆34Apr 24, 2017Updated 8 years ago
- Python library for Cymon.io APIs☆32Jan 3, 2017Updated 9 years ago
- Implementation of our paper "Injecting Knowledge Base Information into End-to-End Joint Entity and Relation Extraction and Coreference Re…☆10Jan 22, 2022Updated 4 years ago
- web(ctf)方面任务练习区域☆10May 22, 2019Updated 6 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- ☆19Jan 28, 2019Updated 7 years ago
- 一种用于序列标注任务的数据标注(分词,NER)的工具☆11Jun 3, 2020Updated 5 years ago
- python日报,每天分享5篇精选python好文☆10Jun 10, 2020Updated 5 years ago
- 计算机病毒与免疫系统☆13Jul 18, 2014Updated 11 years ago
- A human readable log format for Python☆13Nov 3, 2017Updated 8 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago