Trillium's - Master the art Of Necessary cybersecurity skills (T-MON)
☆14Mar 27, 2024Updated 2 years ago
Alternatives and similar repositories for T-MON
Users that are interested in T-MON are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 7 months ago
- STIG-CCI-CONTROLMAPPER☆17Jun 21, 2018Updated 7 years ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆11Jun 9, 2020Updated 5 years ago
- Search NVD locally☆14Jun 4, 2025Updated 11 months ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scripts I created to pass the OSCP☆22Jul 23, 2021Updated 4 years ago
- Penguin OS Forensic (or Flight) Recorder☆41Mar 27, 2026Updated last month
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 6 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆29Mar 8, 2023Updated 3 years ago
- Chrome Logs Events and Protobuf Parser☆39Dec 13, 2022Updated 3 years ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 3 years ago
- ☆20Oct 18, 2022Updated 3 years ago
- Manage a DMX512 universe with an Arduino-based controller directly from the browser by leveraging WebUSB☆26Sep 15, 2018Updated 7 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Fastest UPnP implementation in Golang. Enable port mapping on your router in few lines of code!☆17Sep 1, 2021Updated 4 years ago
- Builds a resume from your LinkedIn profile using JasperSoft's tools☆23Jul 7, 2022Updated 3 years ago
- ☆12Jun 4, 2025Updated 11 months ago
- Simple AWS ELB log parser which parses Classic LB and ALB logs into JSONs☆18May 2, 2025Updated last year
- Scrap Linkedin Jobs, and create resumes with custom skills for each job description☆23Jan 29, 2021Updated 5 years ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 6 years ago
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆18Apr 30, 2025Updated last year
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- Simple, High Quality, Open Source RAG solution for chatting with your documents☆28Dec 12, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Regexplore is a Volatility plugin designed to mimic the functionality of the Registry Explorer plugins in EZsuite☆18Mar 31, 2023Updated 3 years ago
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆15May 18, 2023Updated 2 years ago
- Vulnmine searches for vulnerable hosts using MS SCCM host / software inventory data with NIST NVD Vulnerability feed data.☆38Jul 6, 2023Updated 2 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Nov 5, 2020Updated 5 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆20Jun 22, 2023Updated 2 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆14Jun 12, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of ANSI E1.31 (sACN)☆38Feb 12, 2026Updated 2 months ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆15Jan 9, 2026Updated 4 months ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Collection of different commands and techniques in Hacking :)☆54Jan 29, 2022Updated 4 years ago