Τεκμηρίωση για τα επεισόδια της Άσκησης Κυβερνοάμυνας Πανόπτης 2016
☆17Jun 7, 2016Updated 9 years ago
Alternatives and similar repositories for panoptis2016
Users that are interested in panoptis2016 are comparing it to the libraries listed below
Sorting:
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- ☆11Aug 31, 2019Updated 6 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Ios 11-11.1.2 Jailbreak And ios 10-10.3.3 jailbreak. ORIGINAL PROJECT: https://github.com/JosephShenton/C0F3☆13Feb 8, 2018Updated 8 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 weeks ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Bulk scanning of Hosts and IPs using the Shodan API☆10Apr 26, 2022Updated 3 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- Helping get up to speed with drone via examples☆11Feb 1, 2022Updated 4 years ago
- Simple bash script to enumerate Linux machines☆13Nov 5, 2018Updated 7 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- All statistical models / machine learning / computer vision / financial models / NLP / PySpark / python techniques / library tutorials ca…☆11Nov 26, 2022Updated 3 years ago
- Fast tool to lookup list of IP adresses☆14Oct 5, 2022Updated 3 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- ☆15Sep 29, 2024Updated last year
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- This repository contains a python3 script that is used to deploy a GNS3 topology from a YAML file using GNS3 REST API.☆14Dec 8, 2022Updated 3 years ago
- Athc0n 2012 CTF setups☆15Mar 12, 2015Updated 10 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 7 years ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- Real-time websocket stream of GPS events on a fancy SVG world map☆19Jan 5, 2022Updated 4 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆24Feb 24, 2026Updated last week