Repository for Security Workshop content
☆20Sep 4, 2017Updated 8 years ago
Alternatives and similar repositories for security-workshop
Users that are interested in security-workshop are comparing it to the libraries listed below
Sorting:
- IP Address to ASN/prefix/owner/cc lookup server☆29Jan 3, 2020Updated 6 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- Deploy a honeypot and a crypto currency miner together, so sweet.☆17Aug 12, 2018Updated 7 years ago
- Create a Node.js module with ease☆11Jan 4, 2023Updated 3 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Golang bindings for Grok☆16May 9, 2018Updated 7 years ago
- Template for creating new plugins☆12Nov 10, 2025Updated 4 months ago
- dns logger for passive dns collection☆42May 27, 2012Updated 13 years ago
- Python client for the whois.cymru.com service☆43Nov 8, 2016Updated 9 years ago
- 🦈 Tool for visualizing packet captures.☆44May 3, 2020Updated 5 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Internet data acquisition☆152Jan 1, 2021Updated 5 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- HERE LIES THE MAGIC☆34Jun 28, 2016Updated 9 years ago
- Customizable Message Of The Day (motd)☆15Mar 9, 2019Updated 7 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆58Mar 9, 2017Updated 9 years ago
- A streaming compression / gzip library for node.js☆15Apr 20, 2021Updated 4 years ago
- Simple IP enrichment service and API wrapping PyASN and MaxMind GeoIP.☆71Dec 8, 2022Updated 3 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆26Nov 23, 2017Updated 8 years ago
- Presentation: Intro to Docker☆34Aug 10, 2018Updated 7 years ago
- AMI BMC image generator and decomposer☆14Aug 4, 2016Updated 9 years ago
- A command-line tool to filter text and highlight the output.☆21Aug 27, 2019Updated 6 years ago
- Customize your linux shell with one command line!☆13Oct 15, 2024Updated last year
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆22Oct 30, 2024Updated last year
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- 5.05 kernel dumper payload☆11May 28, 2018Updated 7 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆50Nov 3, 2025Updated 4 months ago