athiasjerome / XORCISMView external linksLinks
eXpandable Open Research on Cyber Information Security Management
☆23May 10, 2020Updated 5 years ago
Alternatives and similar repositories for XORCISM
Users that are interested in XORCISM are comparing it to the libraries listed below
Sorting:
- ☆17Dec 9, 2014Updated 11 years ago
- PowerShell Utilities for Security Situational Awareness☆13Jan 10, 2017Updated 9 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Nov 29, 2015Updated 10 years ago
- Radar provides for early checks and review for software defined templates.☆18May 7, 2016Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 7 years ago
- ☆37Feb 3, 2017Updated 9 years ago
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- Template project for Bow and Arrow series.☆11Jun 12, 2019Updated 6 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- Total Commander plugin for Azure Blob service☆17May 9, 2015Updated 10 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- BPE Tokenizer implementations in C# for Anthropic, OpenAI LLM offerings☆14Oct 5, 2023Updated 2 years ago
- My dotfiles☆12Updated this week
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆23Nov 12, 2025Updated 3 months ago
- window switcher for Microsoft Windows☆13May 16, 2018Updated 7 years ago
- AlienVault Open Threat Exchange App For Splunk☆10May 6, 2014Updated 11 years ago
- This contain the source course for Spring Boot : Complete guide from development to deployment☆14Feb 14, 2019Updated 7 years ago
- ☆10Jan 15, 2026Updated 3 weeks ago
- ☆10Nov 29, 2025Updated 2 months ago
- API for data transmission and retrieval from Monero applications through the Microsoft .NET Framework☆10Jan 16, 2017Updated 9 years ago
- Dynatrace FM-Index library☆15Nov 11, 2025Updated 3 months ago
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Feb 14, 2017Updated 8 years ago
- A copy of the latest version of MVSIS☆12Apr 18, 2021Updated 4 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Data notification service: subscribe to keywords and get notified whenever an open data sources mentions that keyword.☆24Aug 25, 2013Updated 12 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Aug 30, 2024Updated last year
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆36Sep 28, 2015Updated 10 years ago
- ☆46Jan 29, 2024Updated 2 years ago
- ☆43Nov 5, 2018Updated 7 years ago
- Hack day project. Figure out if the main thread is hanging, and if so, what's causing it to hang.☆18Sep 6, 2013Updated 12 years ago
- C# Open Source Disk Operating System☆13Dec 4, 2021Updated 4 years ago
- Web application to visualize GreyNoise API data☆21Dec 4, 2018Updated 7 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago