jt0dd / threat-recognitionLinks
☆21Updated 3 years ago
Alternatives and similar repositories for threat-recognition
Users that are interested in threat-recognition are comparing it to the libraries listed below
Sorting:
- ☆15Updated 3 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 3 months ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- a vulnerable GraphQL application☆19Updated 5 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- ☆15Updated 4 months ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated 5 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 2 years ago
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Take…☆12Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Vulnerable Task Manager☆16Updated 4 months ago
- ☆16Updated last month
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year