☆32Nov 17, 2017Updated 8 years ago
Alternatives and similar repositories for securitai-ui
Users that are interested in securitai-ui are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- ☆21Nov 7, 2023Updated 2 years ago
- Aggregated ATT&CK technique reporting data. Presented at Splunk GovSummit December 2022☆17Jul 18, 2025Updated 9 months ago
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- ☆26Feb 5, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆23Jun 1, 2022Updated 3 years ago
- berlin automatic mail encryption meetup 2016☆13Dec 16, 2016Updated 9 years ago
- Industrial Control Systems Protocol Decoders☆22Apr 30, 2014Updated 12 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Mar 27, 2026Updated last month
- 各种安全相关思维导图整理收集☆11Sep 7, 2015Updated 10 years ago
- Convert STIX XML to HTML☆27Nov 23, 2015Updated 10 years ago
- trivial transparent SMTP proxy☆13Dec 6, 2022Updated 3 years ago
- Who Stole the Postage? Fraud Detection in Return-Freight Insurance Claims☆20Aug 20, 2018Updated 7 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Zeek Junk Drawer - Just some scripts and a place to put them☆28Sep 22, 2020Updated 5 years ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆12Nov 1, 2024Updated last year
- ☆15Feb 27, 2019Updated 7 years ago
- Share files of any size with Chirp and dat☆12Oct 5, 2020Updated 5 years ago
- Drop-in TCP command server☆17Jun 2, 2021Updated 4 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- Tool that listen on a given port and throw all data received to a kafka topic☆14Nov 8, 2023Updated 2 years ago
- ☆11Sep 20, 2016Updated 9 years ago
- git mirror of upstream bzr at http://launchpad.net/bikeshed☆16May 11, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 地图选点一键导出公交到达圈的小工具☆11Apr 4, 2022Updated 4 years ago
- It is deep recommendation model with attribute-level co-attention, which has been accepted as a short paper in SIGIR2020.☆10Aug 13, 2020Updated 5 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆22Mar 20, 2025Updated last year
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 10 months ago
- ☆11Sep 23, 2020Updated 5 years ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 6 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 8 years ago
- Software project☆12Jun 21, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆17Dec 9, 2014Updated 11 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆14Nov 29, 2023Updated 2 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- How to use math formulas in GitHub Markdown documents☆11May 10, 2018Updated 7 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 7 years ago
- Sample application showing how to use multiple sinatra subclass applications in a single process.☆44Jun 5, 2009Updated 16 years ago
- This is the implementation for the paper: Sequential Recommender System based on Hierarchical Attention Network☆11Mar 13, 2021Updated 5 years ago