MITRE ATT&CK visualizations
☆12Jan 28, 2022Updated 4 years ago
Alternatives and similar repositories for snake-attack
Users that are interested in snake-attack are comparing it to the libraries listed below
Sorting:
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- ⚙ Skeleton TiddlyWiki for developing plugins using the ThirdFlow, see: https://thediveo.github.io/TiddlyWikiPluginSkeleton and https://yo…☆10Mar 1, 2020Updated 6 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- A simple bookshelf made in CSS, HTML and vanilla JS.☆11May 2, 2022Updated 3 years ago
- Leo code snippets☆13Apr 27, 2020Updated 5 years ago
- Usage examples for Viz.js☆12Dec 8, 2018Updated 7 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Official resource of the paper "Traditional and Context-Specific Spam Detection in Low Resource Settings", Machine Learning Journal 2022☆13Jun 11, 2022Updated 3 years ago
- Split a TiddlyWiki into multiple text files, one file per tiddler.☆11Apr 18, 2019Updated 6 years ago
- Semantic search web application with graph visualization in Django☆12Aug 2, 2017Updated 8 years ago
- Unmaintained - Simple FileMaker-to-Django model syncing and Pythonic FileMaker access☆12Apr 29, 2016Updated 9 years ago
- WEFTools☆14Apr 30, 2020Updated 5 years ago
- A simple step-flow library.☆15May 9, 2018Updated 7 years ago
- A trimmed down sane API for using ZkTeco fingerprint reader usb devices☆13Nov 20, 2023Updated 2 years ago
- ASP.NET Core provides necessary APIs to implement secure access to an application.In this tutorial, we will see how to implement Role-Bas…☆11Aug 18, 2019Updated 6 years ago
- Plugin for integration of PlantUML in TiddlyWiki☆14Nov 15, 2012Updated 13 years ago
- Pass data between a google sheet and jupyter notebook☆11Mar 5, 2018Updated 8 years ago
- ☆15Sep 17, 2022Updated 3 years ago
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- AI-Powered Threat Intelligence MCP tool☆33Jul 18, 2025Updated 8 months ago
- A desktop solution for BPMN modeling☆12Jan 13, 2021Updated 5 years ago
- ☆10Oct 11, 2020Updated 5 years ago
- zsh completion for docker-compose☆19Oct 15, 2015Updated 10 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 9 years ago
- dotnetcore json based localization support☆12Dec 2, 2025Updated 3 months ago
- Tracking APT IOCs☆25Nov 16, 2020Updated 5 years ago
- Este repositorio contiene los ejemplos que muestran como usar Dapper y Entity Framework Core juntos en la misma aplicación.☆13Jul 6, 2023Updated 2 years ago
- NYT Risk Semantics Project☆12Mar 5, 2016Updated 10 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- An ABP module helps users to define and use dynamic forms at runtime.☆14Dec 19, 2025Updated 3 months ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Template para proyectos de Pentesting y registrar el contenido en un Vault de Obsidian☆14Aug 5, 2021Updated 4 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆20Jul 11, 2021Updated 4 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 2 years ago
- Jupyter Notebook for Natural Language Processing learning☆11Apr 28, 2017Updated 8 years ago
- Python script to convert OPML files to Freeplane/Freemind files☆12Jan 9, 2017Updated 9 years ago
- A JSON extension plugin for TiddlyWiki5☆17Dec 28, 2020Updated 5 years ago