Collection of my Security Blueprints & Guides
☆52Oct 2, 2025Updated 5 months ago
Alternatives and similar repositories for Security-Blueprints
Users that are interested in Security-Blueprints are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Jan 16, 2026Updated 2 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- ☆19Apr 28, 2025Updated 10 months ago
- Automatic Microsoft Sentinel Deployment☆16Apr 1, 2025Updated 11 months ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Jul 26, 2021Updated 4 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆55Updated this week
- OS Patch Level changer for Android Boot && Recovery partitions☆12Nov 11, 2020Updated 5 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 9 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 2 years ago
- Hardened your Windows OS against forensics analysis☆25Nov 27, 2024Updated last year
- ECED440 Computer Security☆11Mar 17, 2026Updated last week
- Hunt for SQLite files used by various applications☆30Mar 1, 2026Updated 3 weeks ago
- ☆16Oct 18, 2024Updated last year
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 9 months ago
- ☆25Jul 11, 2022Updated 3 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- ☆92Jul 10, 2024Updated last year
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆14Jun 3, 2025Updated 9 months ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Aug 11, 2020Updated 5 years ago
- Automated Cloud Misconfiguration Testing☆23Jun 20, 2025Updated 9 months ago
- The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset☆44Apr 15, 2025Updated 11 months ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- ☆11Feb 9, 2023Updated 3 years ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 10 months ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- ☆32Nov 13, 2020Updated 5 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- ☆35Mar 19, 2022Updated 4 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- A curated atelier for security research. Deciphering the anatomy of risk through a disciplined and reproducible toolkit.☆13Feb 17, 2026Updated last month
- A bunch of reverse engineering Binaries dedicated to practice.☆17Feb 14, 2026Updated last month