This Library provides python bindings to interact with the Cylance API.
☆20Mar 20, 2023Updated 2 years ago
Alternatives and similar repositories for python-cyapi
Users that are interested in python-cyapi are comparing it to the libraries listed below
Sorting:
- CyLR - Live Response Collection Tool☆10Jul 14, 2020Updated 5 years ago
- Powershell scripts using CyCLI.☆10May 22, 2019Updated 6 years ago
- Examples for the CyCLI Powershell module☆12Mar 8, 2019Updated 6 years ago
- CyCLI Powershell module☆37Mar 8, 2019Updated 6 years ago
- Useful PowerShell one-liner (and some two-liner) commands☆23Aug 20, 2022Updated 3 years ago
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- PowerShell para Administradores☆11Feb 18, 2020Updated 6 years ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Jan 1, 2025Updated last year
- ✨ Brand Indicators for Message Identification or BIMI ( 📢 pronounced: Bih-mee) is an emerging email 📧 specification that enables the us…☆10Mar 6, 2024Updated last year
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Feb 11, 2026Updated 2 weeks ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- A small stuff of telegram bot for pentest and information gathering.☆11Oct 3, 2020Updated 5 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- ☆10Aug 24, 2024Updated last year
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Python Scripts to Interact with VirusTotal, Malwares.com and Google Safe Browsing.☆11Dec 1, 2016Updated 9 years ago
- Pound Load Balancer used in RELIANOID ADC for HTTP and HTTPS userspace management. It includes some features developed by the RELIANOID T…☆16Jan 2, 2025Updated last year
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆11Apr 3, 2023Updated 2 years ago
- Turn a standard Raspbian Lite install into a tor-ified wifi access point☆14Aug 3, 2017Updated 8 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, mess…☆12Feb 5, 2026Updated 3 weeks ago
- Bro Detection Scripts☆10Mar 9, 2021Updated 4 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- Create dnsmasq DHCP & DNS configs using the Netbox API.☆14Jul 25, 2023Updated 2 years ago
- Get up and running with Llama 3.1, Mistral, Gemma 2, and other large language models.☆15Apr 24, 2025Updated 10 months ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Script to facilitate different functions and checks☆44Aug 4, 2022Updated 3 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- Joulecoin☆13Sep 4, 2020Updated 5 years ago
- Exchange ActiveSync Diagnostic Utility☆13Aug 28, 2014Updated 11 years ago
- Apuntes de "Programación de servicios y procesos"☆12Nov 28, 2018Updated 7 years ago
- Dump Microsoft Portable Executable (PE) Files Information☆15Dec 13, 2025Updated 2 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 5 months ago
- ☆24Feb 19, 2026Updated last week