vhawk19 / automated-threat-intelligent-modelView external linksLinks
An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering python scripts when integrated with McAfee Advanced Threat Defense and Malware Informaton Sharing Platform can defend against new and futuristic cyber attacks.
☆10Jan 23, 2019Updated 7 years ago
Alternatives and similar repositories for automated-threat-intelligent-model
Users that are interested in automated-threat-intelligent-model are comparing it to the libraries listed below
Sorting:
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Security, Compliance and Informational Dashboard System☆25May 12, 2021Updated 4 years ago
-  # Ukraine-Cyber-Operations Cura…☆27Mar 4, 2022Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆12Dec 31, 2023Updated 2 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- ☆12Jun 9, 2021Updated 4 years ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆46Mar 2, 2020Updated 5 years ago
- Read my blog for more info -☆31Apr 27, 2021Updated 4 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- CloudQuery Provider for Azure☆13Aug 15, 2022Updated 3 years ago
- Conditional Access baseline for March 2025☆12Mar 4, 2025Updated 11 months ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆47Jul 8, 2019Updated 6 years ago
- New Tool To Unlock Hc Files Decryptor for HTTP Custom configuration files (LAPSCA)☆14Feb 16, 2023Updated 3 years ago
- A LevelDB-backed RDFLib Store for RDFLib=>6.0☆19May 23, 2024Updated last year
- Tracking Google Enterprise Android Devices☆21Updated this week
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- SECD machine and Lispkit Lisp compiler, in Python☆10Oct 25, 2017Updated 8 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- A simple command line tool for statistical calculation☆10May 12, 2018Updated 7 years ago
- Script spam sms termux☆14Aug 24, 2020Updated 5 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Cuppa is a project open source, that seeks offer a adaptable CMS to any project (news or exist developments, web, desktop or mobile proje…☆10Nov 12, 2019Updated 6 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Tor relay nearest neighbour ranking☆10Oct 18, 2021Updated 4 years ago
- FTP client for humans.☆10Oct 11, 2015Updated 10 years ago
- ☆12Jan 21, 2024Updated 2 years ago
- Code By:Tas9er / F5 BIG-IP 远程命令执行漏洞☆14Mar 29, 2021Updated 4 years ago
- This repository contains data related to coronavirus & COVID-19 based domains identified by Swimlane's DeepDive research team☆11Jul 6, 2020Updated 5 years ago
- SOAP is a free, online tool aimed at enabling civil society organisations and activist groups to build security policies that work for th…☆15Mar 23, 2024Updated last year
- This powerbi dashboards will help the Security team to analyze KBs, delivered monthly by Microsoft☆14Mar 9, 2022Updated 3 years ago
- Apache 2.4.50 Path traversal vulnerability☆17Aug 30, 2022Updated 3 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year