☆52Mar 17, 2026Updated this week
Alternatives and similar repositories for PMPReplay
Users that are interested in PMPReplay are comparing it to the libraries listed below
Sorting:
- Create and manage on chain social graphs☆13Sep 4, 2025Updated 6 months ago
- ☆11Feb 22, 2022Updated 4 years ago
- Publicly accessible version of the FiGHT website.☆17Nov 14, 2025Updated 4 months ago
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated last year
- The infamous Raidforums.com MyBB Theme. (Ripped by @xbdmHQ)☆10Jul 21, 2023Updated 2 years ago
- 🔥 A repository for collecting cyberdefense thoughts, books, and documents about AI cyberdefense☆13Jul 2, 2023Updated 2 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆23Oct 25, 2018Updated 7 years ago
- A NodeJS Template for a Twitter Bot that Tracks Transactions to Bitcoin Wallets☆20May 7, 2018Updated 7 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- How do to CI/CD with Azure Data Factory☆41Nov 2, 2020Updated 5 years ago
- An open framework for computer-enabled insider threat investigations. Contribute today!☆28Updated this week
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Aug 19, 2020Updated 5 years ago
- ☆23Jan 18, 2024Updated 2 years ago
- Code for Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited☆26Oct 31, 2020Updated 5 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Jul 17, 2023Updated 2 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Aug 23, 2025Updated 6 months ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆39Dec 28, 2024Updated last year
- ☆25May 13, 2025Updated 10 months ago
- Repo for cadCad study group resources☆24Jan 17, 2023Updated 3 years ago
- ☆46Jun 1, 2023Updated 2 years ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Jul 7, 2025Updated 8 months ago
- The SOLVE-IT knowledge base for digital forensics☆68Updated this week
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆59Sep 18, 2025Updated 6 months ago
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Jul 19, 2023Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆68Apr 1, 2024Updated last year
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆82Updated this week
- ☆80Feb 11, 2026Updated last month
- ☆75Apr 3, 2025Updated 11 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- ATLAS tactics, techniques, and case studies data☆118Feb 6, 2026Updated last month
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆121Mar 4, 2026Updated 2 weeks ago
- Cyber Underground General Intelligence Requirements