List of groups that are carrying out cyber actions in the conflict between Israel and Iran.
☆34Feb 12, 2026Updated 2 months ago
Alternatives and similar repositories for IsraelIranConflict
Users that are interested in IsraelIranConflict are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.☆30Apr 23, 2024Updated last year
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆12Mar 20, 2026Updated 3 weeks ago
- python framework to parse logs for IR☆15May 2, 2021Updated 4 years ago
- Telegram Bot that you can check if you have an account that has been compromised in any public data breaches☆17Jan 8, 2026Updated 3 months ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- GitHub Repository for the HW CWE SIG☆17Mar 25, 2026Updated 2 weeks ago
- ☆20Jan 14, 2026Updated 3 months ago
- A guide to osint research, including osint information and tools about japan. approaches to non-japanese speaking countries.☆39Jun 21, 2025Updated 9 months ago
- Pentest report framework without data send☆19Sep 23, 2025Updated 6 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC☆17Feb 16, 2024Updated 2 years ago
- We want to create a dynamic monitoring and evaluation tool aims to check and test the resistance level or resilience of communication bet…☆14Mar 30, 2026Updated 2 weeks ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆18Mar 21, 2025Updated last year
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- Monitoring a high precision 10MHz GPS disciplined oscillator (GPSDO)☆14Dec 1, 2024Updated last year
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆14May 27, 2019Updated 6 years ago
- StepMania's Website, forums, etc.☆21Oct 10, 2017Updated 8 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- Seccomp (libseccomp2) adapter for the Nim language☆11Jul 31, 2021Updated 4 years ago
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 11 months ago
- This is a collection of stealers for educational purposes☆25Aug 13, 2025Updated 8 months ago
- Artifact for the paper Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems at CPSIoTSec 202…☆13Nov 17, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆18Aug 13, 2020Updated 5 years ago
- ☆17Nov 16, 2025Updated 4 months ago
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- Security feed, done in the stupid simple way☆27Jan 8, 2025Updated last year
- ☆10May 15, 2022Updated 3 years ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 11 months ago
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆15Jan 9, 2026Updated 3 months ago
- Yaralyze is an malware detection tool for Android that relies on two types of static analysis, Yara rule analysis and hashes analysis.☆21Nov 13, 2022Updated 3 years ago
- A 3D-printable robot design.☆12Apr 4, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆22Mar 24, 2020Updated 6 years ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆32Aug 26, 2024Updated last year
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆22Feb 11, 2026Updated 2 months ago
- Dynamic Malware Analsysis Sandbox☆17Nov 5, 2025Updated 5 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- Navigation app without GPS using steps sensor☆24Mar 17, 2018Updated 8 years ago