Collection of my Security Blueprints & Guides
☆52Oct 2, 2025Updated 7 months ago
Alternatives and similar repositories for Security-Blueprints
Users that are interested in Security-Blueprints are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆28Jan 16, 2026Updated 3 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- ☆19Apr 28, 2025Updated last year
- Automatic Microsoft Sentinel Deployment☆16Apr 1, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆29Sep 10, 2025Updated 7 months ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Apr 1, 2026Updated last month
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆55Updated this week
- A CLI tool to extract, analyze, and filter JavaScript links from web pages or URLs, with regex matching and structured JSON output.☆19Jan 6, 2025Updated last year
- OS Patch Level changer for Android Boot && Recovery partitions☆12Nov 11, 2020Updated 5 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 11 months ago
- Windows anti-forensics module☆25Apr 20, 2026Updated 2 weeks ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Checks for tpm vulnerabilities☆38Mar 16, 2023Updated 3 years ago
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- ECED440 Computer Security☆11Apr 6, 2026Updated 3 weeks ago
- Bypass Xiaomi RSA 256 EDL Auth☆15Sep 2, 2025Updated 8 months ago
- ☆16Oct 18, 2024Updated last year
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 11 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆84May 27, 2025Updated 11 months ago
- ☆25Jul 11, 2022Updated 3 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 10 months ago
- A ruleset to find potentially malicious code in macOS malware samples☆41Aug 29, 2023Updated 2 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 2 months ago
- ☆49May 3, 2024Updated 2 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- BlackHat Asia 2025 code and presentations☆17Apr 13, 2025Updated last year
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆14Sep 28, 2023Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- ☆32Nov 13, 2020Updated 5 years ago
- RegStrike is a .reg payload generator☆57Sep 19, 2023Updated 2 years ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Apr 16, 2026Updated 2 weeks ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago