A daily updated summary of the most frequent types of security advisories currently being reported from different sources.
☆256Feb 14, 2024Updated 2 years ago
Alternatives and similar repositories for cyberowl
Users that are interested in cyberowl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- ☆19Mar 23, 2021Updated 5 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆325May 1, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- ☆188Mar 2, 2026Updated last month
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆20Apr 4, 2023Updated 3 years ago
- Open source alternative to Burpsuite☆16May 18, 2021Updated 4 years ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆755Dec 8, 2025Updated 4 months ago
- AIL framework - Analysis Information Leak framework☆897Updated this week
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Mar 13, 2025Updated last year
- CQ, a code security scanner☆99Feb 23, 2026Updated last month
- Case for CVE-2022-30778☆23Aug 23, 2022Updated 3 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆750Oct 25, 2025Updated 5 months ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- ☆18Aug 31, 2023Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Automatic Prompt Injection testing tool☆25Mar 8, 2025Updated last year
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆158Jun 15, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 4 months ago
- Python library for threat intelligence☆94Jan 14, 2025Updated last year
- Retrieve AD accounts description and search for password in it☆81Jul 21, 2022Updated 3 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Incident Response Methodologies 2022☆1,113Apr 11, 2025Updated last year
- Store ZAP reports historically and compare current ZAP results against the most recent for changes in alerts.☆12Mar 23, 2026Updated 2 weeks ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆401Aug 15, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆35Jan 13, 2026Updated 3 months ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 5 years ago
- Website for ail-typo-squatting library☆73Feb 25, 2026Updated last month
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- ☆34Aug 8, 2023Updated 2 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,111Nov 9, 2024Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year