jt0dd / threat-recognition
☆21Updated 3 years ago
Alternatives and similar repositories for threat-recognition:
Users that are interested in threat-recognition are comparing it to the libraries listed below
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 2 months ago
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆44Updated last year
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- ☆15Updated 3 years ago
- Privilege escalation in Docker☆29Updated 2 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- ☆57Updated last year
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Updated 4 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 3 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆58Updated 3 years ago
- A plugin based GraphQL vulnerability assessment tool.☆14Updated 4 years ago
- Holds the public Hacking the Cloud CTFs.☆55Updated last year
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- ☆14Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, and GitHub☆55Updated last week
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆42Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- ☆62Updated 2 years ago
- ☆18Updated 6 months ago
- Get GTFOBins info about a given exploit from the command line☆37Updated 8 months ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆15Updated 8 months ago