Collection of exploits that were verified by an automated system
☆13Jun 17, 2021Updated 4 years ago
Alternatives and similar repositories for falcon
Users that are interested in falcon are comparing it to the libraries listed below
Sorting:
- ☆14Dec 28, 2020Updated 5 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Blocker Hacks☆15Apr 8, 2022Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- Custom security distro for remote penetration testing☆55Mar 26, 2021Updated 4 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆126Nov 22, 2021Updated 4 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 5 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆193Oct 30, 2022Updated 3 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Nov 12, 2023Updated 2 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Aug 21, 2020Updated 5 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆106Jul 11, 2021Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Dec 11, 2020Updated 5 years ago
- ☆24Feb 2, 2026Updated last month
- ☆25Jun 25, 2021Updated 4 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆33Apr 15, 2022Updated 3 years ago
- Source Code - https://github.com/USStateDept/State-TalentMAP☆13Sep 12, 2023Updated 2 years ago
- Single-threaded epoll-based concurrent bulk whois client☆31Oct 31, 2017Updated 8 years ago
- ☆12Mar 7, 2022Updated 3 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- Fetches YouTube Premium codes from Discord Inventory using tokens (supports bulk)☆11Jun 22, 2022Updated 3 years ago
- ☆20Nov 29, 2023Updated 2 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆310Apr 15, 2024Updated last year
- Offensive OSINT☆33Sep 5, 2020Updated 5 years ago
- Data projects in relation to psychedelics therapeutic research☆11Feb 17, 2023Updated 3 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- ☆13Mar 3, 2023Updated 3 years ago
- Music GAN - GANSynth preprocessing, ProGAN and DCGAN architecture☆11Jan 26, 2023Updated 3 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Contract for a CryptoFiat currency☆11Aug 25, 2018Updated 7 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆41Apr 10, 2016Updated 9 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- ☆12Feb 16, 2017Updated 9 years ago