Convert your spreadsheet or CSV for the GIAC exam to a more compact index. Inspired by Voltaire and usable offline.
☆19Jun 6, 2025Updated 8 months ago
Alternatives and similar repositories for GIAC-Index-Creator
Users that are interested in GIAC-Index-Creator are comparing it to the libraries listed below
Sorting:
- Tracking and documenting monthly insights about hacktivist coalitions.☆23Sep 14, 2025Updated 5 months ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Automatically converts your firefox browser into a hacking tool by installing required plugins.☆12Jun 26, 2017Updated 8 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- dnsoverhttps - D'oh!☆14Sep 20, 2018Updated 7 years ago
- ☆16Sep 13, 2022Updated 3 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- Microsoft Exam MD-100 Windows 10 Certification Guide, published by Packt☆12Jan 30, 2023Updated 3 years ago
- Tor command line tools for Mac☆12Jan 20, 2016Updated 10 years ago
- Linux Server Administration Made Easy with Hands-on Training [Video], Published by Packt☆12Jan 18, 2023Updated 3 years ago
- ☆12Apr 1, 2023Updated 2 years ago
- 基于领英的企业用户名收集☆13Feb 3, 2020Updated 6 years ago
- Python API for generating Maltego mtgx files.☆18Sep 27, 2016Updated 9 years ago
- Study Guide for the LFCS exam☆13Jul 4, 2018Updated 7 years ago
- A shell script to generate Linux Server's health report in HTML☆12Mar 8, 2017Updated 8 years ago
- ☆21May 1, 2025Updated 10 months ago
- A collection of resources related to vulnerability management.☆15Aug 8, 2023Updated 2 years ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 5 months ago
- The BXAQ malware is used in China. They force tourists to install this app at the border. The malware downloads a tourist’s text messages…☆10Jul 12, 2019Updated 6 years ago
- A test case runner for Sigma rules☆14Aug 14, 2024Updated last year
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- A curated list of awesome projects, libraries, and tools for MedSec.☆19Mar 22, 2019Updated 6 years ago
- A tool for studying JavaScript malware.☆15Updated this week
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Manual zsys garbage collection script.☆18Mar 4, 2021Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Mar 18, 2020Updated 5 years ago
- Python string obfuscator☆12Apr 12, 2019Updated 6 years ago
- Using plotly to perfom data visualization of ransomware leak site data☆14Feb 15, 2024Updated 2 years ago
- A SOCMINT tool with an interactive GUI to assist criminal investigations☆16Aug 8, 2020Updated 5 years ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- Scripts released by Linuxium / Ian Morrison☆14Jan 8, 2019Updated 7 years ago