jt0dd / threat-recognitionLinks
☆21Updated 3 years ago
Alternatives and similar repositories for threat-recognition
Users that are interested in threat-recognition are comparing it to the libraries listed below
Sorting:
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆200Updated 6 months ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- Privilege escalation in Docker☆30Updated 3 years ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- Holds the public Hacking the Cloud CTFs.☆59Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- ☆60Updated 2 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- ☆34Updated 4 years ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆21Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 11 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 7 months ago
- ☆79Updated 4 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- ☆113Updated 2 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Updated 11 months ago
- AWS SSO serverless phishing API.☆32Updated 4 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- CVE/Research Publications☆25Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆67Updated 4 months ago
- ☆104Updated 2 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago