☆35Aug 20, 2018Updated 7 years ago
Alternatives and similar repositories for CyberMonitor-APT_CyberCriminal_Campagin_Collections
Users that are interested in CyberMonitor-APT_CyberCriminal_Campagin_Collections are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Software package for intertemporal pricing optimization under reference effects and consumer heterogeneity estimation. Please see REAMDE.…☆10Mar 7, 2024Updated 2 years ago
- A Web Self Service Application for Generating OpenC2 Commands☆10Sep 26, 2019Updated 6 years ago
- a modular malware framework written in golang☆11May 6, 2019Updated 7 years ago
- Emulating firmware poorly but quickly!☆17Dec 18, 2020Updated 5 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 3 years ago
- python3 version of cloacked-pixel.☆13Oct 8, 2022Updated 3 years ago
- RascalC: A Fast Code for Galaxy Covariance Matrix Estimation☆12Apr 28, 2026Updated last week
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- a open source rat from china☆12Oct 28, 2016Updated 9 years ago
- ☆18Dec 3, 2024Updated last year
- ☆13Apr 8, 2021Updated 5 years ago
- The FASTEST way to parse Email☆18Dec 24, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 months ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 5 months ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- An RF stack for building exfiltration systems.☆17Oct 24, 2018Updated 7 years ago
- Webshell && Backdoor Collection☆12Apr 11, 2017Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatically exported from code.google.com/p/plcscan☆18Sep 5, 2015Updated 10 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- build gdb static for all support arch☆26Apr 27, 2022Updated 4 years ago
- Collection of advice to new IT security folks☆18Oct 25, 2018Updated 7 years ago
- ☆16May 15, 2025Updated 11 months ago
- it's popular to keep reference lists on github☆13May 2, 2022Updated 4 years ago
- ☆12Mar 28, 2026Updated last month
- source&exe☆39Jul 18, 2017Updated 8 years ago
- This repository will have pre-processed dataset and related scripts for building Machine learning based model for classification of False…☆14Aug 8, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- ☆20Dec 3, 2020Updated 5 years ago
- ☆18Sep 24, 2017Updated 8 years ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆104Feb 25, 2026Updated 2 months ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Jan 13, 2022Updated 4 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago