Documentation and Issue Tracking for Stucco
☆20Mar 7, 2017Updated 9 years ago
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android attempt at PoC CVE-2016-8655☆13Jul 1, 2017Updated 8 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- Extract cyber security entities from unstructured text☆34Apr 24, 2017Updated 8 years ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Feb 20, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- FFT for PyCuda and PyOpenCL. The package is deprecated and its functionality is merged into Reikna.☆37Feb 17, 2014Updated 12 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- PERCEIVE is a project incubator inspired by Apache Incubator and Stack Exchange's Area 51. It serves as a staging zone repository for the…☆13May 21, 2018Updated 7 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Time-Machine Dynamic Bulk Packet Recorder☆36Apr 21, 2025Updated 11 months ago
- ☆12Mar 23, 2024Updated 2 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 9 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- poc for cve-2017-10661☆12Aug 11, 2017Updated 8 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆22Apr 15, 2016Updated 9 years ago
- Small bash function library to turn on bash options that enhance robustness of scripts.☆17Apr 17, 2025Updated 11 months ago
- Data files for use with hubble☆16Apr 21, 2020Updated 5 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- The androidvulnerabilities.org website and source data☆21Jul 7, 2020Updated 5 years ago
- CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android☆10Feb 13, 2017Updated 9 years ago
- Script to enable debug output in the mach_kernel☆26Apr 5, 2016Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆29May 4, 2016Updated 9 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Detect HTTP stalling attacks like slowloris with Bro☆19Mar 1, 2018Updated 8 years ago
- My emacs configuration.☆10Apr 1, 2026Updated last week
- This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Asses…☆19Mar 8, 2023Updated 3 years ago
- The source code of Disconnected Emerging Knowledge Graph Oriented Inductive Link Prediction☆10May 6, 2022Updated 3 years ago