SOC bilgileri yer almaktadır.
☆22Jul 2, 2025Updated 8 months ago
Alternatives and similar repositories for Security-Operation-Center
Users that are interested in Security-Operation-Center are comparing it to the libraries listed below
Sorting:
- ☆15May 6, 2023Updated 2 years ago
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Jun 5, 2024Updated last year
- Nmap Network Scanning Türkçe Dökümantasyonu☆43Mar 5, 2025Updated last year
- Search security keys, domains, ip addresses in the APK project. You can also add to the search terms. If it finds leak data, you can have…☆18Nov 1, 2022Updated 3 years ago
- Siber güvenlik ve daha fazlası!☆22Apr 10, 2023Updated 2 years ago
- ☆24Dec 29, 2025Updated 2 months ago
- Chista | Open Threat Intelligence Framework☆63May 18, 2024Updated last year
- ☆11Feb 28, 2022Updated 4 years ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆37Feb 27, 2026Updated last week
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 11 months ago
- 81 ilde 81 Öğretmen Kodluyor☆12Apr 15, 2019Updated 6 years ago
- ✅ Experience the power of an automated Insecure Direct Object Reference (IDOR) vulnerability detection tool. Safeguard your applications …☆68Mar 9, 2025Updated last year
- Machine learning based credit risk prediction system☆27Nov 18, 2025Updated 3 months ago
- ☆15Feb 2, 2025Updated last year
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago
- An open-source, web-based platform that helps users learn programming through interactive, real-time coding challenges.☆21Jul 11, 2025Updated 7 months ago
- This "Automotive Cybersecurity Career Roadmap" is tailored for individuals aspiring to build expertise in automotive cybersecurity.☆21Jan 3, 2025Updated last year
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- ☆11Sep 1, 2022Updated 3 years ago
- Dark version of macOS Catalina theme☆14Jun 21, 2023Updated 2 years ago
- ☆14Feb 20, 2025Updated last year
- ☆12Dec 6, 2022Updated 3 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Bu Course LLM(Large Language Model) Fine Tune işlemlerini Türkçe klavuz olarak☆11Mar 29, 2025Updated 11 months ago
- Config files for my GitHub profile.☆13Oct 9, 2022Updated 3 years ago
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆14May 10, 2023Updated 2 years ago
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆26Jun 24, 2025Updated 8 months ago
- ☆13Mar 23, 2023Updated 2 years ago
- ☆11Apr 8, 2024Updated last year
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Ping Monster v1.9 - a freeware ping monitoring tool, with some alert actions like: send email, sound alert, http post.☆11Sep 6, 2023Updated 2 years ago
- Pardus Lightdm Greeter☆12Feb 27, 2026Updated last week
- ☆12Dec 14, 2021Updated 4 years ago
- 25.11.2021 Siber Güvenlik İçin Python Eğitiminde Yazılan Kodlar☆13Nov 25, 2021Updated 4 years ago
- ☆12Nov 22, 2016Updated 9 years ago
- Wireless Network Security Analysis Tool☆16Apr 27, 2025Updated 10 months ago
- Pentest automation resources for Burp☆15Mar 10, 2024Updated 2 years ago