PowerShell module containing commands to easily interact with the Cybereason API.
☆16Jan 4, 2026Updated last month
Alternatives and similar repositories for CybereasonAPI
Users that are interested in CybereasonAPI are comparing it to the libraries listed below
Sorting:
- sync NIST's National Vulnerability Database into a local sqlite3 database☆14Apr 27, 2013Updated 12 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Sep 24, 2022Updated 3 years ago
- This project aims to capture network traffic on a local network, filter out packets related to WhatsApp calls, and extract the public IP …☆23Jan 21, 2025Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆32Dec 30, 2020Updated 5 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- ☆12Oct 19, 2024Updated last year
- Collection of configuration files that can be used as good starting points to secure different services and tools☆17Nov 11, 2025Updated 3 months ago
- Plugwise python module for Smiles (Anna, Adam, P1) and Stretch☆13Updated this week
- A template repository for building external data providers for Gatekeeper.☆12Aug 14, 2023Updated 2 years ago
- Compute network diagnostic connectivity statistics using increasingly-larger ping payloads.☆13Aug 20, 2013Updated 12 years ago
- GTK theme based on original Adwaita, default theme of the GNOME desktop☆11Jun 21, 2023Updated 2 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- ☆11Dec 3, 2014Updated 11 years ago
- Arduino boards (unofficial).☆10Jan 22, 2026Updated last month
- Easy Python virus framework☆12Nov 13, 2021Updated 4 years ago
- Code repository for Raspberry Pi for Secret Agents Third Edition, published by Packt☆12Jan 14, 2021Updated 5 years ago
- Yet another way to represent data in text. Addresses niche needs.☆11Mar 23, 2024Updated last year
- PowerShell cmdlets you may find useful☆14Jan 8, 2025Updated last year
- PowerShell Funcitons that can be used to help automate and troubleshoot Windows Updates☆17Feb 19, 2026Updated last week
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- Cowrie SSH/Telnet Honeypot☆12Sep 3, 2018Updated 7 years ago
- PowerShell Script for AD Security Assessment☆17Jul 18, 2023Updated 2 years ago
- imported from https://dangerous-prototypes-open-hardware.googlecode.com/svn/branches/pyBusPirate☆15Jul 24, 2020Updated 5 years ago
- StingRay / IMSI Catcher Detector☆12Sep 18, 2018Updated 7 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- Fork of famous packet sniffer suite☆13Dec 12, 2011Updated 14 years ago
- Bash script that creates directories and files to organize a pentesting☆12May 26, 2021Updated 4 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- workspace manager for i3☆33Jun 25, 2022Updated 3 years ago
- Services from training sessions of A&D season☆12Jun 1, 2021Updated 4 years ago
- All credits to Matt Walker (Author of "CEH Certified Ethical Hacker All-in-One Exam Guide" ISBN 1264269943)☆11Feb 5, 2022Updated 4 years ago
- JS canvas base sine wave animation☆14Mar 30, 2018Updated 7 years ago
- External plugins for RuneLite☆16Updated this week
- small cli scripts to dump & manage some ctf tasks☆13Nov 9, 2024Updated last year
- Client implementation for schollz/find on a ESP* platform.☆14Jun 11, 2017Updated 8 years ago
- ☆16Sep 1, 2017Updated 8 years ago
- A python implementation of clustering optimization using the Artificial Bee Colony algorithm☆18Jun 14, 2016Updated 9 years ago
- ☆13Dec 27, 2023Updated 2 years ago