Trillium's - Master the art Of Necessary cybersecurity skills (T-MON)
☆14Mar 27, 2024Updated 2 years ago
Alternatives and similar repositories for T-MON
Users that are interested in T-MON are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jul 12, 2020Updated 5 years ago
- This is Web Application Penetration Testing Report made for everybody who wanted a glance of how to make a professional report for pentet…☆18Sep 3, 2021Updated 4 years ago
- STIG-CCI-CONTROLMAPPER☆17Jun 21, 2018Updated 7 years ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- Search NVD locally☆14Jun 4, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Scripts I created to pass the OSCP☆22Jul 23, 2021Updated 4 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated this week
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆28Mar 8, 2023Updated 3 years ago
- Chrome Logs Events and Protobuf Parser☆39Dec 13, 2022Updated 3 years ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- ☆20Oct 18, 2022Updated 3 years ago
- Manage a DMX512 universe with an Arduino-based controller directly from the browser by leveraging WebUSB☆26Sep 15, 2018Updated 7 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Builds a resume from your LinkedIn profile using JasperSoft's tools☆23Jul 7, 2022Updated 3 years ago
- A Node.js module that helps users create, find, and join "events" such as a multiplayer game. You may think of this as a matchmaking lob…☆15Jul 28, 2025Updated 8 months ago
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- Simple AWS ELB log parser which parses Classic LB and ALB logs into JSONs☆18May 2, 2025Updated 10 months ago
- ☆32Jul 7, 2020Updated 5 years ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 6 years ago
- ☆18Aug 30, 2015Updated 10 years ago
- A lightweight Python module to interact with the MITRE ATT&CK® Enterprise dataset. Built for speed with minimal dependencies. Read the do…☆11Nov 24, 2025Updated 4 months ago
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆18Apr 30, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CTF challenges that I created☆19Dec 26, 2021Updated 4 years ago
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- A Simple RedLineStealer☆13Aug 30, 2023Updated 2 years ago
- OpenEMR 5.0.1 allows an authenticated attacker to upload and execute malicious php codes.☆14Jan 20, 2021Updated 5 years ago
- Simple, High Quality, Open Source RAG solution for chatting with your documents☆28Dec 12, 2024Updated last year
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Regexplore is a Volatility plugin designed to mimic the functionality of the Registry Explorer plugins in EZsuite☆18Mar 31, 2023Updated 2 years ago
- cyber security notes for your consumption.☆14Jul 30, 2024Updated last year
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Jun 4, 2021Updated 4 years ago
- An `LD_PRELOAD` hack to make arbitrary programs work with systemd socket activation☆21Nov 14, 2025Updated 4 months ago
- Breaking Captchas with Convolutional Neural Nets☆15Dec 9, 2016Updated 9 years ago
- Vulnmine searches for vulnerable hosts using MS SCCM host / software inventory data with NIST NVD Vulnerability feed data.☆38Jul 6, 2023Updated 2 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆15Aug 9, 2023Updated 2 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Nov 5, 2020Updated 5 years ago