A collection of cyber tutorials including Python examples
☆17Oct 10, 2022Updated 3 years ago
Alternatives and similar repositories for cyber
Users that are interested in cyber are comparing it to the libraries listed below
Sorting:
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated last year
- This repository contains source code and a high-quality test dataset for "Automated Commit Message Generation with Large Language Models.…☆10Nov 6, 2025Updated 4 months ago
- ☆11Jul 25, 2023Updated 2 years ago
- ☆11Dec 4, 2024Updated last year
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- An Arduino sketch for the Adafruit SCD4X and SCD-30 CO2 sensor running on an ESP32 with an http server.☆19May 31, 2025Updated 9 months ago
- ☆13Nov 12, 2024Updated last year
- Reproducing feature engineering & oversampling experiments on TPEHG DB and assessing the real impact of over-sampling☆16Jan 19, 2020Updated 6 years ago
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 2 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- ☆11Nov 8, 2023Updated 2 years ago
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated last month
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- my programming / infosec scratchpad☆11Apr 25, 2023Updated 2 years ago
- 🐧 Security-focused Linux distribution with 140+ tools, custom kernel 6.17.13, AI assistant | 5 editions | Cloud, AI/ML, Automotive, Hard…☆29Feb 27, 2026Updated last week
- LLM supported Toolkit for Blue Team/ SOC Operations☆46Jan 10, 2026Updated last month
- ☆13Dec 14, 2021Updated 4 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 8 years ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- [IEEE JBHI] The official code for "Automatic Segmentation of Hemorrhages in the Ultra-wide Field Retina: Multi-scale Attention Subtractio…☆15Feb 25, 2025Updated last year
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 4 months ago
- ☆11Jan 2, 2023Updated 3 years ago
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- ☆12Oct 10, 2024Updated last year
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- ☆12Updated this week
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Feb 11, 2026Updated 3 weeks ago
- ☆12Aug 8, 2024Updated last year
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- A package that get baseball data☆13Feb 24, 2025Updated last year