PowerShell module containing commands to easily interact with the Cybereason API.
☆16Jan 4, 2026Updated 3 months ago
Alternatives and similar repositories for CybereasonAPI
Users that are interested in CybereasonAPI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- sync NIST's National Vulnerability Database into a local sqlite3 database☆14Apr 27, 2013Updated 12 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Sep 24, 2022Updated 3 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆32Dec 30, 2020Updated 5 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Collection of configuration files that can be used as good starting points to secure different services and tools☆17Mar 22, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- PowerShell cmdlets you may find useful☆14Jan 8, 2025Updated last year
- ☆12Oct 19, 2024Updated last year
- Detect WFP filters blocking EDR communications☆97Jan 5, 2024Updated 2 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆16Jun 3, 2022Updated 3 years ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆23Oct 30, 2024Updated last year
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Simulation environment for attacks on computer networks☆22Jun 1, 2022Updated 3 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A ping detection tool for linux☆24Apr 20, 2020Updated 5 years ago
- Bash script that creates directories and files to organize a pentesting☆12May 26, 2021Updated 4 years ago
- Easy Python virus framework☆12Nov 13, 2021Updated 4 years ago
- Services from training sessions of A&D season☆12Jun 1, 2021Updated 4 years ago
- JS canvas base sine wave animation☆14Mar 30, 2018Updated 8 years ago
- vcxproj generator☆22Nov 28, 2017Updated 8 years ago
- Extract Reddit user data☆20Apr 23, 2022Updated 3 years ago
- Easy Port Scanner with Python☆14Dec 3, 2021Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 8 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆420Jan 13, 2026Updated 2 months ago
- Code for the Arduino for the Secret Agents book☆14Sep 12, 2015Updated 10 years ago
- A template repository for building external data providers for Gatekeeper.☆12Aug 14, 2023Updated 2 years ago
- Large public A&D training on 2018-11-04☆24Jun 1, 2021Updated 4 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 10 months ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Jun 15, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆36Nov 16, 2020Updated 5 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- Generating YARA rules based on binary code☆221Oct 7, 2021Updated 4 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆46Feb 2, 2023Updated 3 years ago
- The best Python Backdoor👌☆19Dec 8, 2021Updated 4 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆19Mar 1, 2023Updated 3 years ago
- Intentionaly very vulnerable API with bonus bad coding practices☆52Nov 15, 2025Updated 4 months ago