Enterprise Response Model & Common Knowledge
☆38Jul 3, 2025Updated 8 months ago
Alternatives and similar repositories for ERMACK
Users that are interested in ERMACK are comparing it to the libraries listed below
Sorting:
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆20Nov 12, 2024Updated last year
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- реп полезностей для PT MaxPatrol SIEM☆24Sep 18, 2023Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- ☆16Nov 27, 2023Updated 2 years ago
- A Windows 10 login phishing page for your red team exercises☆15Apr 25, 2021Updated 4 years ago
- 1C Exploit Kit☆78Dec 8, 2021Updated 4 years ago
- DES Rainbow Table Online Phase☆24Aug 2, 2017Updated 8 years ago
- ownCloud exploits for CVE-2023-49105☆37Dec 5, 2023Updated 2 years ago
- A micro Insurance web application for small scale Insurance company. The application is written with PHP and MySql☆12Dec 24, 2021Updated 4 years ago
- Примеры с моего YouTube/Rutube канала☆41Jan 29, 2026Updated last month
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Репозиторий, содержащий решения тасков и описание инцидента - RedShift190☆10Dec 26, 2023Updated 2 years ago
- Modbus VCR☆28Oct 6, 2017Updated 8 years ago
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Jul 6, 2024Updated last year
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- Easy-to-use IDA plugin for code emulation☆54Nov 29, 2025Updated 3 months ago
- To host ProcessMaker v3 Community Editions☆10Jun 18, 2024Updated last year
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Bruteratel☆13Oct 26, 2022Updated 3 years ago
- Project for cd12354: Movie Picture Pipeline☆12Aug 2, 2024Updated last year
- GitHub Organization Auto Invitation Bot with User Interface. Anyone need to give his email and submit. He will get invitation instantly t…☆10Oct 6, 2022Updated 3 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- ☆15Sep 4, 2024Updated last year
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- Dante socks proxy + FreeRadius + DaloRadius + MySQL + phpMyAdmin☆10Aug 29, 2017Updated 8 years ago
- Interactive C Programming Self-Learning Course☆24Oct 6, 2025Updated 4 months ago
- Описывается чего и как настроено в моем рабочем окружении☆16Jan 27, 2022Updated 4 years ago
- Kaspersky Security Center: custom decoders and rules for Wazuh SIEM☆18Aug 16, 2024Updated last year
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Wazuh - Virtual Machines (OVA and AMI)☆16Updated this week
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- windows Local privilege escalation for xp sp3+ (x86/x64)☆12Oct 26, 2017Updated 8 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 3 weeks ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago