A daily updated summary of the most frequent types of security advisories currently being reported from different sources.
☆256Feb 14, 2024Updated 2 years ago
Alternatives and similar repositories for cyberowl
Users that are interested in cyberowl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- ☆19Mar 23, 2021Updated 4 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆324May 1, 2025Updated 10 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- ☆187Mar 2, 2026Updated 3 weeks ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆20Apr 4, 2023Updated 2 years ago
- Open source alternative to Burpsuite☆16May 18, 2021Updated 4 years ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆750Dec 8, 2025Updated 3 months ago
- AIL framework - Analysis Information Leak framework☆889Mar 16, 2026Updated last week
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Mar 13, 2025Updated last year
- CQ, a code security scanner☆99Feb 23, 2026Updated last month
- Case for CVE-2022-30778☆23Aug 23, 2022Updated 3 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆751Oct 25, 2025Updated 4 months ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- ☆18Aug 31, 2023Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Automatic Prompt Injection testing tool☆24Mar 8, 2025Updated last year
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆158Jun 15, 2023Updated 2 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 4 months ago
- Python library for threat intelligence☆93Jan 14, 2025Updated last year
- Retrieve AD accounts description and search for password in it☆81Jul 21, 2022Updated 3 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Incident Response Methodologies 2022☆1,107Apr 11, 2025Updated 11 months ago
- Store ZAP reports historically and compare current ZAP results against the most recent for changes in alerts.☆12Mar 9, 2026Updated 2 weeks ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Aug 15, 2025Updated 7 months ago
- ☆35Jan 13, 2026Updated 2 months ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago
- Website for ail-typo-squatting library☆72Feb 25, 2026Updated 3 weeks ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,054Nov 9, 2024Updated last year
- ☆34Aug 8, 2023Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year