tubakvgc / Security-Operation-CenterView external linksLinks
SOC bilgileri yer almaktadır.
☆22Jul 2, 2025Updated 7 months ago
Alternatives and similar repositories for Security-Operation-Center
Users that are interested in Security-Operation-Center are comparing it to the libraries listed below
Sorting:
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Jun 5, 2024Updated last year
- ☆15May 6, 2023Updated 2 years ago
- Nmap Network Scanning Türkçe Dökümantasyonu☆42Mar 5, 2025Updated 11 months ago
- Search security keys, domains, ip addresses in the APK project. You can also add to the search terms. If it finds leak data, you can have…☆18Nov 1, 2022Updated 3 years ago
- Siber güvenlik ve daha fazlası!☆21Apr 10, 2023Updated 2 years ago
- ☆24Dec 29, 2025Updated last month
- Chista | Open Threat Intelligence Framework☆63May 18, 2024Updated last year
- ☆11Feb 28, 2022Updated 3 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- 81 ilde 81 Öğretmen Kodluyor☆12Apr 15, 2019Updated 6 years ago
- ✅ Experience the power of an automated Insecure Direct Object Reference (IDOR) vulnerability detection tool. Safeguard your applications …☆47Mar 9, 2025Updated 11 months ago
- Machine learning based credit risk prediction system☆27Nov 18, 2025Updated 2 months ago
- An open-source, web-based platform that helps users learn programming through interactive, real-time coding challenges.☆21Jul 11, 2025Updated 7 months ago
- ☆15Feb 2, 2025Updated last year
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 9 months ago
- This "Automotive Cybersecurity Career Roadmap" is tailored for individuals aspiring to build expertise in automotive cybersecurity.☆21Jan 3, 2025Updated last year
- ☆14Feb 20, 2025Updated 11 months ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Dark version of macOS Catalina theme☆13Jun 21, 2023Updated 2 years ago
- ☆11Sep 1, 2022Updated 3 years ago
- ☆12Dec 6, 2022Updated 3 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆16Oct 20, 2024Updated last year
- Bu Course LLM(Large Language Model) Fine Tune işlemlerini Türkçe klavuz olarak☆11Mar 29, 2025Updated 10 months ago
- Ping Monster v1.9 - a freeware ping monitoring tool, with some alert actions like: send email, sound alert, http post.☆11Sep 6, 2023Updated 2 years ago
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆26Jun 24, 2025Updated 7 months ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆13May 10, 2023Updated 2 years ago
- ☆11Apr 8, 2024Updated last year
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Config files for my GitHub profile.☆13Oct 9, 2022Updated 3 years ago
- LLM system to deliver personalized podcasts around bookmarked papers on Zotero.☆15Jan 5, 2026Updated last month
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- Torify the system with multiple tor exit nodes and load balance.☆18May 29, 2024Updated last year
- 25.11.2021 Siber Güvenlik İçin Python Eğitiminde Yazılan Kodlar☆12Nov 25, 2021Updated 4 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Aug 8, 2023Updated 2 years ago
- ☆12Nov 22, 2016Updated 9 years ago