☆17May 7, 2019Updated 6 years ago
Alternatives and similar repositories for Publications
Users that are interested in Publications are comparing it to the libraries listed below
Sorting:
- ☆14May 18, 2022Updated 3 years ago
- A script for quickly gathering GeoIP data on a single or multiple IP Addresses☆16Aug 31, 2015Updated 10 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆25Jul 5, 2021Updated 4 years ago
- ☆15Oct 7, 2025Updated 5 months ago
- A Sublime Text 3 syntax highlighting plugin for email message headers.☆32Feb 19, 2017Updated 9 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- Find abuse contacts for observables☆69Nov 10, 2022Updated 3 years ago
- ☆31May 24, 2019Updated 6 years ago
- Connect your miner to this proxy instead of directly to the pool, to switch pools or coins without miner restart☆39Oct 18, 2018Updated 7 years ago
- # hpro This is a python base script from which you can hack or clone any person's facebook friendlist or followers accounts which have …☆11May 9, 2021Updated 4 years ago
- ☆13Feb 12, 2017Updated 9 years ago
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- Your one-stop shop for everything you need to know during #Hack weekend.☆11May 31, 2019Updated 6 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- ☆12Feb 16, 2023Updated 3 years ago
- ☆39Dec 10, 2020Updated 5 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- ☆10May 29, 2023Updated 2 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 9 years ago
- SensePost's modified hostapd for wifi attacks.☆13Oct 11, 2020Updated 5 years ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Dec 14, 2025Updated 2 months ago
- A Web Self Service Application for Generating OpenC2 Commands☆10Sep 26, 2019Updated 6 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 5 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- ☆11Sep 6, 2017Updated 8 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- A new PagerDuty agent.☆11Sep 15, 2025Updated 5 months ago
- PowerShell Module that converts MSG files to EML files☆11Sep 5, 2019Updated 6 years ago
- ☆13Jun 6, 2024Updated last year
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 6 years ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- Manage SLAs in Redmine!☆14Feb 12, 2026Updated 3 weeks ago
- ☆14Feb 8, 2020Updated 6 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- YunoHost DynDNS Server☆13Apr 18, 2025Updated 10 months ago
- ☆14Nov 12, 2021Updated 4 years ago