Recent cyber attacks reports & interesting analysis files
☆15Apr 14, 2022Updated 3 years ago
Alternatives and similar repositories for reports
Users that are interested in reports are comparing it to the libraries listed below
Sorting:
- ☆14Dec 28, 2020Updated 5 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 5 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆193Oct 30, 2022Updated 3 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆310Apr 15, 2024Updated last year
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Custom security distro for remote penetration testing☆55Mar 26, 2021Updated 4 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆33Apr 15, 2022Updated 3 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆106Jul 11, 2021Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- ☆25Jun 25, 2021Updated 4 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆223Aug 8, 2023Updated 2 years ago
- python_dark_web☆28May 7, 2019Updated 6 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆126Nov 22, 2021Updated 4 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆948Dec 3, 2025Updated 2 months ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Sep 16, 2024Updated last year
- Automation around Entra ID☆38Jul 21, 2025Updated 7 months ago
- ☆39Sep 29, 2021Updated 4 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- Azure-Sentinel-BYOML☆12Nov 8, 2019Updated 6 years ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Import Recommended Firewall Rules from vRNI to VMware Cloud on AWS or NSX-T☆10Feb 3, 2022Updated 4 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago
- ☆44Jul 11, 2025Updated 7 months ago
- ☆12May 10, 2023Updated 2 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- This is useful if you are running an investigation to determine the usage of the same username on different social networks.☆12Dec 10, 2020Updated 5 years ago
- SocialNetSpy© is an information gathering tool based on Python. It obtains all the social network profiles and general informations of a …☆10Oct 14, 2022Updated 3 years ago