Yavuzlar / CTI-ReportsView external linksLinks
Reports of cyber threat intelligence
☆13Feb 15, 2023Updated 3 years ago
Alternatives and similar repositories for CTI-Reports
Users that are interested in CTI-Reports are comparing it to the libraries listed below
Sorting:
- An open-source, web-based platform that helps users learn programming through interactive, real-time coding challenges.☆21Jul 11, 2025Updated 7 months ago
- ☆13Mar 23, 2023Updated 2 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated last month
- ad-exchange powershell scripts☆29Sep 23, 2025Updated 4 months ago
- ☆25Nov 19, 2018Updated 7 years ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated 11 months ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- ☆485Feb 2, 2025Updated last year
- ☆10Jul 8, 2024Updated last year
- ☆49Jan 14, 2025Updated last year
- ScanWP is an open-source scanning tool designed to identify potential security vulnerabilities in WordPress sites.☆11Nov 14, 2023Updated 2 years ago
- TRC20 Wallet Listen Events☆11Aug 30, 2023Updated 2 years ago
- ☆11Mar 27, 2022Updated 3 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆13Jun 2, 2024Updated last year
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 10 months ago
- ☆10Nov 15, 2025Updated 3 months ago
- ☆10Aug 11, 2025Updated 6 months ago
- ☆10Aug 14, 2023Updated 2 years ago
- ☆31Updated this week
- ☆10Mar 16, 2019Updated 6 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- Generate boilerplate + endpoints for Fiber or Gin REST APIs.☆10Feb 21, 2022Updated 3 years ago
- ☆15Feb 12, 2023Updated 3 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- simple script to solve the problem of internet connection after ParrotOS-Anonsurf☆15Apr 2, 2022Updated 3 years ago
- I have created this dashboard to track oscp preparation. I have used several resources and has been mentioned in dashboard. Tjnull's blog…☆13Jul 8, 2022Updated 3 years ago
- STMCTF17 Writeups☆36Nov 8, 2017Updated 8 years ago
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- ☆13Jun 14, 2024Updated last year
- 📋 Guide to regular commit messages☆11Dec 24, 2024Updated last year
- 25.11.2021 Siber Güvenlik İçin Python Eğitiminde Yazılan Kodlar☆12Nov 25, 2021Updated 4 years ago
- Defalyzer is a cross-platform software that focuses on defacement analyzing and mirror tracking.☆14Mar 10, 2022Updated 3 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- Resources to accelerate deployment of bots to aide with an influx of COVID related questions☆16May 20, 2020Updated 5 years ago
- ☆11Oct 20, 2019Updated 6 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Random Password Generator built with Next.js and JavaScript☆13Dec 14, 2021Updated 4 years ago
- Unencrypted is my blogpage which features some blogs and writeups related to IT.☆11Apr 2, 2024Updated last year