☆44Oct 16, 2025Updated 4 months ago
Alternatives and similar repositories for cloud-vulnerabilities
Users that are interested in cloud-vulnerabilities are comparing it to the libraries listed below
Sorting:
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆11Apr 22, 2022Updated 3 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- ☆19Aug 6, 2021Updated 4 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Nov 26, 2020Updated 5 years ago
- ☆18Sep 2, 2021Updated 4 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- ☆49Updated this week
- ☆19Sep 2, 2018Updated 7 years ago
- Best prompt usecase for Top App/Website Builder☆26Aug 30, 2025Updated 6 months ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- Welcome to the hands-on resource hub for the Generative AI Development Environments Bootcamp. This repo is designed to help you explore d…☆25Oct 22, 2025Updated 4 months ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 2 weeks ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- KEV EPSS Data☆31Updated this week
- ☆23Jun 30, 2021Updated 4 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Jul 21, 2021Updated 4 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- A Self Balancing Robot☆25Feb 5, 2016Updated 10 years ago