MITRE ATT&CK visualizations
☆12Jan 28, 2022Updated 4 years ago
Alternatives and similar repositories for snake-attack
Users that are interested in snake-attack are comparing it to the libraries listed below
Sorting:
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago
- A trimmed down sane API for using ZkTeco fingerprint reader usb devices☆13Nov 20, 2023Updated 2 years ago
- Pass data between a google sheet and jupyter notebook☆11Mar 5, 2018Updated 7 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- PowerShell para Administradores☆11Feb 18, 2020Updated 6 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- One of the best Grabbers to get the Passwords, Cookies and tokens from your friends ;)☆10Aug 29, 2023Updated 2 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- Código del tutorial: Drag and Drop (arrastra y suelta) en Javascript con SortableJS☆10Jan 28, 2020Updated 6 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- Semantic search web application with graph visualization in Django☆12Aug 2, 2017Updated 8 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- ☆11Dec 9, 2025Updated 2 months ago
- ☆15Sep 17, 2022Updated 3 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆10Dec 8, 2022Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- 🦈 Prometheus exporter for pcap metrics☆16Feb 15, 2023Updated 3 years ago
- A common database library for managing and querying security data☆18Jan 12, 2026Updated last month
- A small stuff of telegram bot for pentest and information gathering.☆11Oct 3, 2020Updated 5 years ago
- Drag & Drop Email Template Builder☆10Dec 3, 2020Updated 5 years ago
- Leo code snippets☆13Apr 27, 2020Updated 5 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- Usage examples for Viz.js☆12Dec 8, 2018Updated 7 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- Pound Load Balancer used in RELIANOID ADC for HTTP and HTTPS userspace management. It includes some features developed by the RELIANOID T…☆16Jan 2, 2025Updated last year
- Maritimo is a set of applications used to decode, persist and display AIS data☆10Apr 1, 2023Updated 2 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Visualize an Rdio collection chronologically and listen in-page.☆24May 27, 2022Updated 3 years ago
- ASP.NET Core provides necessary APIs to implement secure access to an application.In this tutorial, we will see how to implement Role-Bas…☆11Aug 18, 2019Updated 6 years ago
- ⚙ Skeleton TiddlyWiki for developing plugins using the ThirdFlow, see: https://thediveo.github.io/TiddlyWikiPluginSkeleton and https://yo…☆10Mar 1, 2020Updated 6 years ago
- Turn a standard Raspbian Lite install into a tor-ified wifi access point☆14Aug 3, 2017Updated 8 years ago