A collection of attacks metadata that were used in my previous pen-test tools
☆17Dec 23, 2022Updated 3 years ago
Alternatives and similar repositories for cyber-attacks
Users that are interested in cyber-attacks are comparing it to the libraries listed below
Sorting:
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 5 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆310Apr 15, 2024Updated last year
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆193Oct 30, 2022Updated 3 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆126Nov 22, 2021Updated 4 years ago
- A multithread tool to scan for available APs and display their Signal Strength, Security Protocol, SSID and channels. Written in Python (…☆12Jul 6, 2021Updated 4 years ago
- Bill of Materials and all parts for Ultimaker Original Heated Bed Upgrade☆12Sep 7, 2021Updated 4 years ago
- Listen to the weather using Sonic Pi and data from Mathematica☆11Dec 6, 2018Updated 7 years ago
- Azure-Sentinel-BYOML☆12Nov 8, 2019Updated 6 years ago
- Utils for Cryptography class (1047622)☆14Nov 13, 2025Updated 3 months ago
- How to bypass your Bell Aliant provided modems.☆13Feb 2, 2026Updated last month
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- Rival UAV Detection and Tracking Algorithm for Fighter UAVs☆10Nov 10, 2024Updated last year
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago
- A utility/cheat for Mu Online classic☆11Mar 11, 2018Updated 7 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- Mobile application and IoT network analysis automation tool.☆11May 9, 2019Updated 6 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- Python Script to Parse Phone # and E-mails from Websites☆10Mar 23, 2022Updated 3 years ago
- scavenger is a ruby brute forcing script that uses Typhoeus gem to enable parallelization and sends multiple http requests with various p…☆12Aug 25, 2021Updated 4 years ago
- 中华诗词大典网页项目,旨在展示中华古诗词的古老智慧!☆10Jun 5, 2024Updated last year
- Next generation radiation mapping using UAS assisted dynamic monitoring networks☆10Mar 1, 2020Updated 6 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- Raspberry pi zero w tor usb wifi adapter☆10Dec 28, 2018Updated 7 years ago
- Facebook phishing page☆10Oct 4, 2020Updated 5 years ago
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- A small php script for generating iOS and Mac OS X compatible FritzBox!-VPN-Config files☆29Mar 19, 2020Updated 5 years ago
- Open source ballistics library☆12Aug 27, 2020Updated 5 years ago
- Enter the target number and run the script. The target will receive a phone call every 3 seconds.☆14Jun 24, 2017Updated 8 years ago
- A script to copy/backup the backup files from a Proxmox server to an external harddrive and a tape device☆10Apr 30, 2025Updated 10 months ago
- ☆11Dec 13, 2021Updated 4 years ago
- Aggressive Mass AP Deauth/Jammer (PWN ALL WIFI IN RANGE)☆14May 26, 2023Updated 2 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Espressif Systems ESP32 based fire works controller☆14Nov 30, 2017Updated 8 years ago