CyATP: Cybersecurity Awareness Training Platform
☆23Feb 15, 2022Updated 4 years ago
Alternatives and similar repositories for CyATP
Users that are interested in CyATP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CyTrONE: Integrated Cybersecurity Training Framework☆88Mar 13, 2025Updated last year
- A very simple app to make formatted flashcards from Google Sheets☆10Jul 25, 2018Updated 7 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- ☆22Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆16Oct 10, 2023Updated 2 years ago
- ☆13Jan 28, 2026Updated last month
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- please use https://github.com/fireeye/vivisect instead☆16Oct 21, 2025Updated 5 months ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆66May 21, 2024Updated last year
- Modeling and simulation of ICS devices☆13Mar 6, 2026Updated 3 weeks ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- Snooze - Log aggregation and alerting☆10Sep 19, 2025Updated 6 months ago
- Website for pid.codes☆13Apr 10, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Geographical Information Science Tutorial and Practice course in UCAS☆13Dec 12, 2021Updated 4 years ago
- A simple bot that open chests for you.☆14Nov 3, 2018Updated 7 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- ☆12Jun 11, 2021Updated 4 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- Anomaly detection using RAG☆17Apr 22, 2024Updated last year
- ☆13Oct 14, 2017Updated 8 years ago
- CIS benchmark quickplay for rapid assessments of the NGFW☆13Jul 27, 2023Updated 2 years ago
- Automated Safety Testing of Large Language Models☆18Jan 31, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆12Jun 22, 2023Updated 2 years ago
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆22Feb 15, 2022Updated 4 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 4 months ago
- ☆12Aug 23, 2019Updated 6 years ago
- Generate network packets using generative modeling☆15May 17, 2023Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆22Dec 14, 2025Updated 3 months ago
- ☆16Oct 17, 2019Updated 6 years ago
- Simple nmap transformer to create Hosts/Ansible files or create Mongo Inventory database☆14Mar 11, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Cyber Security Awareness Framework (CSAF)☆101Feb 17, 2026Updated last month
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Oct 1, 2016Updated 9 years ago
- 基于Wi-Fi CSI和机器学习的环境异常感知☆18Apr 8, 2020Updated 5 years ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Aug 7, 2024Updated last year
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 4 months ago
- Vault 7: CIA Hacking Tools Revealed☆17Mar 8, 2017Updated 9 years ago