Graphs in Cybersecurity - Bloodhound
☆20Oct 8, 2024Updated last year
Alternatives and similar repositories for cybersecurity
Users that are interested in cybersecurity are comparing it to the libraries listed below
Sorting:
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- Community documentation for known Hack The Box v4 API endpoints☆26Oct 6, 2022Updated 3 years ago
- A document tagging library☆33Mar 27, 2025Updated 11 months ago
- StreamlitとLangGraphで実装したHuman-in-the-loop広告コピー文生成アプリケーション☆11Feb 15, 2025Updated last year
- PowerShell module that brings Dataverse's Web API to PowerShell 7+ with features like piping, batching and more.☆18Dec 7, 2025Updated 2 months ago
- Learn How To Observe, Manage, and Scale, Agentic AI Apps Using Azure AI Foundry - with this hands-on workshop☆39Feb 5, 2026Updated 3 weeks ago
- [READ ONLY] Subtree split of the siyuan-packages-monorepo (see https://github.com/Zuoqiu-Yingyi/siyuan-packages-monorepo)☆12Jan 23, 2024Updated 2 years ago
- A function invocation framework for Python☆11Feb 21, 2024Updated 2 years ago
- Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients usin…☆12Jun 23, 2020Updated 5 years ago
- CTF writeups☆16Nov 20, 2025Updated 3 months ago
- Python class for interacting with Project Zomboid servers using RCON☆10Oct 17, 2025Updated 4 months ago
- Use Forgejo with Coolify just like GitHub! Native integration for browsing repos, automatic webhooks, and push-to-deploy☆13Jul 16, 2025Updated 7 months ago
- ⚡ Developer-friendly hybrid-RAG toolkit merging Graphiti, Qdrant, mem0, LlamaIndex, and LangChain into one powerful engine.☆15Jan 14, 2026Updated last month
- Designed an android application using android studio 1.3, java, xml. This application is a digital version of the actual Monopoly game. I…☆10Sep 25, 2021Updated 4 years ago
- ☆11Dec 5, 2022Updated 3 years ago
- This project leverages data analytics to gain insights into gender diversity and inclusion within the company. The Power BI dashboard and…☆19Mar 14, 2024Updated last year
- Caddy modules for WireGuard integration and network routing.☆47Aug 9, 2024Updated last year
- http CONNECT tunnel☆10Mar 26, 2020Updated 5 years ago
- a scanner for scan website's directories and files☆12Oct 15, 2017Updated 8 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- OSCP Exam Report Template in Markdown☆11Jan 14, 2021Updated 5 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- This repository serves as a personal collection of Power BI Dashboard and Report sample files, along with the datasets used in the sample…☆19Sep 23, 2023Updated 2 years ago
- ☆10Jul 28, 2021Updated 4 years ago
- CVE-2021-33766-poc☆11Sep 15, 2021Updated 4 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 4 months ago
- ☆14Jun 1, 2023Updated 2 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- python jupyter notebook tutorials☆12Sep 24, 2025Updated 5 months ago
- Simple tool to monitor network changes over time and trigger alerts☆15Mar 11, 2020Updated 5 years ago
- Just a vault template to help someone on the certificate.☆12Sep 3, 2025Updated 6 months ago
- Hardening script for Windows (Domain mode or without domain)☆16Sep 18, 2025Updated 5 months ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- Smokeping SSH Probe for Mikrotik RouterOS☆16Jan 11, 2026Updated last month
- ☆12Updated this week
- OSCP preparation☆12Sep 18, 2025Updated 5 months ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago