An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering python scripts when integrated with McAfee Advanced Threat Defense and Malware Informaton Sharing Platform can defend against new and futuristic cyber attacks.
☆10Jan 23, 2019Updated 7 years ago
Alternatives and similar repositories for automated-threat-intelligent-model
Users that are interested in automated-threat-intelligent-model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Navio is a program to create and manage linux containers. This project exists only for study purposes, so feel free to contribute :)☆15Dec 5, 2022Updated 3 years ago
- Attack Surface Mapper is a reconnaissance tool that uses a mixture of open source intellgence and active techniques to expand the attack …☆17Apr 8, 2024Updated 2 years ago
- Professional Wargaming LLM Toolbox☆22Jul 9, 2025Updated 9 months ago
- Cuppa is a project open source, that seeks offer a adaptable CMS to any project (news or exist developments, web, desktop or mobile proje…☆10Nov 12, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- DNP3 Cyber-attack datasets☆16Mar 9, 2017Updated 9 years ago
- Source code of a online medicine shop to buy medicines and locate nearby medicine stores. This is my final year college project .☆11Dec 8, 2022Updated 3 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆23Jul 26, 2022Updated 3 years ago
- Aulas da disciplina de Computação Gráfica no CEFET/MG☆15Feb 1, 2026Updated 2 months ago
- Exercises and examples using the R programming language for the discipline of probability and statistics.☆10Jul 17, 2021Updated 4 years ago
- Private AI and Open source driven projects that can be used to help solve a plethora of security problems☆19Sep 7, 2024Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Attack Traffic Generation(ATG) tool enable users to explore automotive CAN bus cyber-security rapidly☆19Jun 26, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ruggedy Vulnerability Management App☆14Dec 8, 2019Updated 6 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- IntelOwl's client library/SDK in golang.☆22May 6, 2025Updated 11 months ago
- This is a script that helps you to bruteforce login page of the following sites: Facebook, Twitter, Instagram. I think you will find this…☆35Oct 1, 2020Updated 5 years ago
- Security, Compliance and Informational Dashboard System☆25May 12, 2021Updated 4 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- A python script to carry out brute force attack on JIIT cyberoam portal.☆12Nov 16, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Read my blog for more info -☆30Apr 27, 2021Updated 4 years ago
- CVE-2021-22205 RCE☆13Jul 4, 2022Updated 3 years ago
- K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388☆54May 9, 2022Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Code 4rena Sandbox & Exploits☆14Mar 1, 2022Updated 4 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Apache 2.4.50 Path traversal vulnerability☆17Aug 30, 2022Updated 3 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- ☆28Jan 22, 2020Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago