Τεκμηρίωση για τα επεισόδια της Άσκησης Κυβερνοάμυνας Πανόπτης 2016
☆16Jun 7, 2016Updated 9 years ago
Alternatives and similar repositories for panoptis2016
Users that are interested in panoptis2016 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago
- Bulk scanning of Hosts and IPs using the Shodan API☆10Apr 26, 2022Updated 4 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 7 years ago
- ☆20Jan 31, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆10Jan 21, 2019Updated 7 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 6 months ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- Security Rules & Workflows for the new wave of AI Development.☆46Aug 7, 2025Updated 9 months ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- A framework for building behaviour-driven tests in fluent Java.☆35Mar 27, 2020Updated 6 years ago
- Offensive Security & Red Teaming Labs and Projects☆27Aug 26, 2025Updated 8 months ago
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆17Nov 11, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Framework for learning automotive embedded software architecture and cyber security☆15Sep 4, 2018Updated 7 years ago
- All statistical models / machine learning / computer vision / financial models / NLP / PySpark / python techniques / library tutorials ca…☆12Nov 26, 2022Updated 3 years ago
- Cyber Attack Management for Metasploit☆13Jun 7, 2014Updated 11 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆13Jun 9, 2020Updated 5 years ago
- Master Kali Linux, Excel in Offensive Security☆34Jun 15, 2025Updated 10 months ago
- 🚗 A curated list of resources for learning about vehicle security and safety.☆19Jul 10, 2019Updated 6 years ago
- Docker image to download and run panama papers database in Neo4j☆15Aug 25, 2016Updated 9 years ago
- Converts NDJSON to JSON☆19Apr 2, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Resources for SANS CTI Summit 2020 presentation☆20Dec 24, 2019Updated 6 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- A collection of game theory notebooks☆26Sep 23, 2025Updated 7 months ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- ALPACA: A tool for building dynamic cyber ranges from procedurally-generated vulnerability lattices☆22Apr 23, 2019Updated 7 years ago
- Fundamental of information theory in computer science perspective☆19Aug 19, 2018Updated 7 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- ☆21May 19, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 10 years ago
- ☆62Jan 20, 2026Updated 3 months ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆22May 27, 2025Updated 11 months ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago