catalyst256 / CyberNomadResourcesView external linksLinks
Accompanying documentation, images, source code and other stuff from the cybernomad.online blog
☆27Sep 21, 2020Updated 5 years ago
Alternatives and similar repositories for CyberNomadResources
Users that are interested in CyberNomadResources are comparing it to the libraries listed below
Sorting:
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 2 weeks ago
- Automated tool to find backup files that may disclose a website's source code☆20Oct 13, 2022Updated 3 years ago
- Analyzing Neo4j Query Log files and more in the Neo4j Desktop☆17Jun 5, 2025Updated 8 months ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Nov 22, 2021Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- ☆12Jul 29, 2019Updated 6 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Sep 1, 2023Updated 2 years ago
- macOS triage is a python script to collect various macOS logs, artifacts, and other data.☆25Mar 25, 2021Updated 4 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- ☆26Jun 22, 2022Updated 3 years ago
- AIL project training materials☆39Jul 17, 2025Updated 6 months ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆35Feb 17, 2021Updated 4 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆40Nov 23, 2023Updated 2 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Aug 12, 2024Updated last year
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- Detection rule validation☆40Oct 25, 2023Updated 2 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago
- ☆11Apr 25, 2021Updated 4 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- open source knowledge for Syllabics font design and development☆10Nov 13, 2024Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Oct 31, 2021Updated 4 years ago
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 2 months ago
- Generate GSM authentication triplets (as per 3GPP TS 55.205)☆16Jan 11, 2018Updated 8 years ago
- ☆11Dec 12, 2025Updated 2 months ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Spiders a website using the darknet via Tor☆12Jun 18, 2017Updated 8 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆14Jul 19, 2025Updated 6 months ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 4 years ago
- ☆10Apr 2, 2022Updated 3 years ago