Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.
☆20Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for iSOC
Users that are interested in iSOC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- A SIEM inspired by HECTOR, built on Django.☆27Apr 16, 2019Updated 7 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- SendToXray - Burp Suite Extender, Send HTTP request to XRAY proxy.☆11May 22, 2021Updated 4 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Oct 29, 2022Updated 3 years ago
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆25Feb 25, 2022Updated 4 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Hello, Attack Surface Scan, BurpSuite完全被动扫描插件,不主动发送任何请求,适合挂机使用。☆24Jul 10, 2022Updated 3 years ago
- NSE script to automatically discover SD-WAN nodes☆23Sep 4, 2019Updated 6 years ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 4 years ago
- DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by l…☆17Nov 15, 2023Updated 2 years ago
- Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once☆48Aug 19, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Feed Generator for MISP☆19Nov 2, 2022Updated 3 years ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆59Dec 31, 2022Updated 3 years ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Sep 8, 2021Updated 4 years ago
- Bypass Cisco Umbrella DNS Proxy Firewall Restrictions☆58Sep 24, 2023Updated 2 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆66Sep 19, 2019Updated 6 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- Source code for Django Testing Tutorial☆11Jul 17, 2022Updated 3 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆35Feb 17, 2021Updated 5 years ago
- dmg2img converter, used to flash DMG images on the fly on EtchDroid☆16Aug 17, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Hackable website for teaching/training purposes. Includes my undergraduate thesis.☆14Mar 7, 2018Updated 8 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Web interface to IntelMQ☆10Mar 26, 2026Updated 3 weeks ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Jul 31, 2023Updated 2 years ago
- ☆21Jun 23, 2018Updated 7 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Explains how to setup a omnibus full gitlab-ce (git, registry, pages) with HTTPS and Let's Encrypt certificates☆10Jan 4, 2022Updated 4 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- 🛡 Check Windows and Control Configs and Security - CWiCCS (read as QUICKS)☆13Jan 14, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Helps generate better emoji assets for the Telegram's Android client.☆12Jan 2, 2019Updated 7 years ago
- Automatically exported from code.google.com/p/xml2rfc-xxe☆11Jul 9, 2022Updated 3 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆19Dec 23, 2024Updated last year
- ☆15May 22, 2021Updated 4 years ago
- Diary application built using Django.☆12Sep 22, 2021Updated 4 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated 2 weeks ago