Aggregates security advisories from 10 international CERTs daily and provides an AI skill that cross-references alerts against your project's tech stack.
☆257Apr 30, 2026Updated this week
Alternatives and similar repositories for cyberowl
Users that are interested in cyberowl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- ☆19Mar 23, 2021Updated 5 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated 2 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆327May 1, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- ☆190Mar 2, 2026Updated 2 months ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆20Apr 4, 2023Updated 3 years ago
- Open source alternative to Burpsuite☆16May 18, 2021Updated 4 years ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆759Dec 8, 2025Updated 4 months ago
- AIL framework - Analysis Information Leak framework☆926Apr 24, 2026Updated last week
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Mar 13, 2025Updated last year
- ☆18Aug 31, 2023Updated 2 years ago
- CQ, a code security scanner☆99Feb 23, 2026Updated 2 months ago
- Case for CVE-2022-30778☆23Aug 23, 2022Updated 3 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆750Oct 25, 2025Updated 6 months ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Automatic Prompt Injection testing tool☆25Mar 8, 2025Updated last year
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆159Jun 15, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 5 months ago
- Retrieve AD accounts description and search for password in it☆81Jul 21, 2022Updated 3 years ago
- Python library for threat intelligence☆101Jan 14, 2025Updated last year
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Incident Response Methodologies 2022☆1,117Apr 11, 2025Updated last year
- Store ZAP reports historically and compare current ZAP results against the most recent for changes in alerts.☆12Mar 23, 2026Updated last month
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆402Aug 15, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆35Jan 13, 2026Updated 3 months ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 5 years ago
- Website for ail-typo-squatting library☆73Feb 25, 2026Updated 2 months ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- ☆34Aug 8, 2023Updated 2 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,116Nov 9, 2024Updated last year
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago