Training and support materials for MSTICPy
☆18Jun 27, 2023Updated 2 years ago
Alternatives and similar repositories for msticpy-training
Users that are interested in msticpy-training are comparing it to the libraries listed below
Sorting:
- A lab environment for learning about MSTICPy☆38Feb 3, 2023Updated 3 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆35Mar 24, 2025Updated 11 months ago
- Sample Snap Minis☆10May 26, 2023Updated 2 years ago
- ☆36Apr 29, 2025Updated 10 months ago
- ☆10Aug 7, 2025Updated 6 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- Public API cache proxy built on the Earth Science Online Video Database, an Airtable base, which also syncs to Zotero and broadcasts new …☆13Updated this week
- ☆22Nov 22, 2025Updated 3 months ago
- ☆10Mar 6, 2023Updated 2 years ago
- ☆12Jul 4, 2024Updated last year
- ☆10Mar 11, 2024Updated last year
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- ☆14Feb 19, 2023Updated 3 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- ☆15Apr 20, 2020Updated 5 years ago
- ☆11Feb 11, 2024Updated 2 years ago
- Resources for Cyber Security☆11Oct 30, 2018Updated 7 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ☆11Dec 17, 2024Updated last year
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- ☆14Jun 27, 2022Updated 3 years ago
- The code provided by this project can be used to create Azure Functions to provision quickly, with a simple GET or POST call users and gr…☆11Aug 12, 2024Updated last year
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- ☆11Sep 7, 2023Updated 2 years ago
- Mirror for Carthage artifacts in GCS☆11Aug 7, 2025Updated 6 months ago
- Python library for easy handling of disk-images☆12Feb 11, 2026Updated 2 weeks ago
- Jupyter Kernel for CodeQL☆15Feb 26, 2025Updated last year
- Dependency vulnerability auditor for PHP☆14Jun 5, 2023Updated 2 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- implement a paper in Matlab: Detection of Cyber-attacks to indoor real time localization systems for autonomous robots☆13Dec 21, 2019Updated 6 years ago
- Some of my flag protected writeups☆11Apr 13, 2020Updated 5 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- ☆12Nov 1, 2022Updated 3 years ago
- ☆13Oct 8, 2020Updated 5 years ago
- A tool to embed files into images☆14Feb 10, 2021Updated 5 years ago
- A demonstration of OWASP 2017 Top 10 and .NET Core☆11Mar 17, 2023Updated 2 years ago