☆13Mar 23, 2023Updated 2 years ago
Alternatives and similar repositories for AD-Attack-Defense
Users that are interested in AD-Attack-Defense are comparing it to the libraries listed below
Sorting:
- A curated list of FOSS software appliances for building a SOC☆18Jan 11, 2021Updated 5 years ago
- ☆20Aug 4, 2019Updated 6 years ago
- ☆11Feb 28, 2022Updated 4 years ago
- ☆10Jul 8, 2024Updated last year
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- 25.11.2021 Siber Güvenlik İçin Python Eğitiminde Yazılan Kodlar☆13Nov 25, 2021Updated 4 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ad-exchange powershell scripts☆29Sep 23, 2025Updated 5 months ago
- Github action for monitoring CVE☆43Updated this week
- Burp Report Generator☆11Mar 1, 2025Updated last year
- ☆35Updated this week
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Resources and notes for Offensive Security's SOC-200 course and OffSec Defense Analyst (OSDA) exam☆17May 19, 2023Updated 2 years ago
- Search security keys, domains, ip addresses in the APK project. You can also add to the search terms. If it finds leak data, you can have…☆18Nov 1, 2022Updated 3 years ago
- ☆11Jan 18, 2020Updated 6 years ago
- Multicopter UAV simulation for control/RL experiments.☆23Nov 11, 2023Updated 2 years ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Tools & TTP's for Active Directory Red Teaming☆31Dec 22, 2024Updated last year
- Passive subdomain enumeration tool for bug-bounty hunters & penetration testers.☆12Jan 10, 2021Updated 5 years ago
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- Arduino Kitabimizda Gecen Ornek Kodlar☆10Feb 23, 2017Updated 9 years ago
- Mastering Internet of Things by Packt☆11Jan 30, 2023Updated 3 years ago
- ☆20Mar 14, 2025Updated last year
- Welcome! I'm Alparslan Akyıldız, an author focusing on cybersecurity and technology. Explore my guides, books, and texts designed to simp…☆72Mar 26, 2025Updated 11 months ago
- All in One Recon Tool for Bug Bounty☆16Dec 30, 2022Updated 3 years ago
- Passive subdomain enumeration tool with http-probe.☆32Apr 30, 2021Updated 4 years ago
- A tool to attack ARP☆15May 27, 2021Updated 4 years ago
- ☆20Oct 29, 2015Updated 10 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- Reactive webapp running on a Raspberry Pi cluster☆16May 21, 2015Updated 10 years ago
- ☆16Oct 18, 2025Updated 5 months ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- Deep Learning Capstone Project. Live camera app that can interpret number strings in real-world images.☆14May 30, 2016Updated 9 years ago
- Ansible script to install cassandra on a raspberry pi cluster☆12Apr 13, 2015Updated 10 years ago