R package for working with data stored within VERIS framework
☆13Dec 22, 2015Updated 10 years ago
Alternatives and similar repositories for verisr
Users that are interested in verisr are comparing it to the libraries listed below
Sorting:
- Gather information on Wiki contributions from IP ranges☆23Jan 21, 2018Updated 8 years ago
- A Slack bot to retrieve the documentation of an R function☆20Dec 8, 2022Updated 3 years ago
- Terminal Linux Syscall Reference Table for x86, x64, arm32 and arm64☆21May 24, 2020Updated 5 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆20Mar 21, 2018Updated 7 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- ☆11Apr 6, 2023Updated 2 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- SPI flash read MitM attack PoC☆40May 24, 2022Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Setting goals using Prophet forecast models in R☆11Jan 3, 2019Updated 7 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆12Oct 1, 2024Updated last year
- R data dictionary☆12Mar 24, 2025Updated 11 months ago
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago
- A platform of detailed R programming codes for Data Analytics☆16Sep 24, 2014Updated 11 years ago
- Download raw data from the Fatality Analysis Reporting System and prepare it for research.☆11Dec 17, 2025Updated 2 months ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Jul 9, 2022Updated 3 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- A few Clio examples☆14Oct 11, 2021Updated 4 years ago
- ☆10Apr 10, 2024Updated last year
- Is it hot right now?☆12Jun 28, 2025Updated 8 months ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 3 months ago
- GPG Encrypts an IMAP folder☆12May 4, 2020Updated 5 years ago
- Jolly good library for SPIF/Label/Clearance handling☆11Jan 2, 2024Updated 2 years ago
- Gradio chat interface for FastMLX☆12Sep 22, 2024Updated last year
- SoapySDR Red Pitaya module☆10Oct 9, 2025Updated 4 months ago
- Powered by Library Genesis☆23Jun 4, 2016Updated 9 years ago
- Finds the Happiest US and Indian State based on Sentimental Analysis of Twitter Data☆13Apr 20, 2015Updated 10 years ago
- ☆10Jan 28, 2026Updated last month
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- A tutorial of the basics of data analysis and visualization in the R programming language, for complete beginners.☆14Sep 28, 2018Updated 7 years ago
- MachineLearningSamples-TDSPUCIAdultIncome☆11Jun 28, 2019Updated 6 years ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- EVM in python from scratch because why not☆11Aug 22, 2022Updated 3 years ago