An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering python scripts when integrated with McAfee Advanced Threat Defense and Malware Informaton Sharing Platform can defend against new and futuristic cyber attacks.
☆10Jan 23, 2019Updated 7 years ago
Alternatives and similar repositories for automated-threat-intelligent-model
Users that are interested in automated-threat-intelligent-model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Navio is a program to create and manage linux containers. This project exists only for study purposes, so feel free to contribute :)☆15Dec 5, 2022Updated 3 years ago
- Attack Surface Mapper is a reconnaissance tool that uses a mixture of open source intellgence and active techniques to expand the attack …☆18Apr 8, 2024Updated last year
- Professional Wargaming LLM Toolbox☆21Jul 9, 2025Updated 8 months ago
- Cuppa is a project open source, that seeks offer a adaptable CMS to any project (news or exist developments, web, desktop or mobile proje…☆10Nov 12, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DNP3 Cyber-attack datasets☆16Mar 9, 2017Updated 9 years ago
- Source code of a online medicine shop to buy medicines and locate nearby medicine stores. This is my final year college project .☆11Dec 8, 2022Updated 3 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- Aulas da disciplina de Computação Gráfica no CEFET/MG☆15Feb 1, 2026Updated last month
- Exercises and examples using the R programming language for the discipline of probability and statistics.☆10Jul 17, 2021Updated 4 years ago
- Private AI and Open source driven projects that can be used to help solve a plethora of security problems☆19Sep 7, 2024Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Attack Traffic Generation(ATG) tool enable users to explore automotive CAN bus cyber-security rapidly☆18Jun 26, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This is a script that helps you to bruteforce login page of the following sites: Facebook, Twitter, Instagram. I think you will find this…☆34Oct 1, 2020Updated 5 years ago
- Ruggedy Vulnerability Management App☆14Dec 8, 2019Updated 6 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- IntelOwl's client library/SDK in golang.☆22May 6, 2025Updated 10 months ago
- Security, Compliance and Informational Dashboard System☆25May 12, 2021Updated 4 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- A python script to carry out brute force attack on JIIT cyberoam portal.☆12Nov 16, 2016Updated 9 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Read my blog for more info -☆30Apr 27, 2021Updated 4 years ago
- CVE-2021-22205 RCE☆13Jul 4, 2022Updated 3 years ago
- K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388☆54May 9, 2022Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Code 4rena Sandbox & Exploits☆14Mar 1, 2022Updated 4 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Apache 2.4.50 Path traversal vulnerability☆17Aug 30, 2022Updated 3 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- ☆28Jan 22, 2020Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago