Collection of exploits that were verified by an automated system
☆13Jun 17, 2021Updated 4 years ago
Alternatives and similar repositories for falcon
Users that are interested in falcon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Dec 28, 2020Updated 5 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆48Apr 26, 2021Updated 4 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆129Nov 22, 2021Updated 4 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆105Apr 26, 2022Updated 3 years ago
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 4 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆196Oct 30, 2022Updated 3 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆11Jan 29, 2024Updated 2 years ago
- Blocker Hacks☆15Apr 8, 2022Updated 3 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆110Jul 11, 2021Updated 4 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15May 17, 2025Updated 10 months ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆34Apr 15, 2022Updated 3 years ago
- A collection of hacks and one-off scripts☆18Jun 4, 2021Updated 4 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆312Apr 15, 2024Updated last year
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Dec 11, 2020Updated 5 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- Offensive OSINT☆33Sep 5, 2020Updated 5 years ago
- CARET - A tool for viewing cyber analytic relationships☆27Aug 21, 2020Updated 5 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- ☆26Jun 25, 2021Updated 4 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- ☆13Mar 3, 2023Updated 3 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- How to bypass your Bell Aliant provided modems.☆13Feb 2, 2026Updated last month
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 4 years ago
- The psychedelic tunnel-runner☆13Jun 26, 2024Updated last year