MiniprintA medium interaction printer honeypot 🍯
Stars: ✭ 177 (+342.5%)
Awesome Cybersecurity Blueteam💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+5127.5%)
honeykuA Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (+40%)
aevAndroid library to verify the safety of user devices. Make sure that API calls from your app can be trusted. Instantly detect rooted devices, emulators, cloned apps, and other risk factors.
Stars: ✭ 64 (+60%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+50%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (+300%)
Deception As DetectionDeception based detection techniques mapped to the MITRE’s ATT&CK framework
Stars: ✭ 228 (+470%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (+112.5%)
ETWNetMonv3ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detection by VirtualMemAlloc Events (in-memory) etc.
Stars: ✭ 32 (-20%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (+167.5%)
rdppotRDP honeypot
Stars: ✭ 55 (+37.5%)
gwdomainssub domain wild card filtering tool
Stars: ✭ 38 (-5%)
ObjRecPoseEstObject Detection and 3D Pose Estimation
Stars: ✭ 71 (+77.5%)
VISO[IEEE TGRS 2021] Detecting and Tracking Small and Dense Moving Objects in Satellite Videos: A Benchmark
Stars: ✭ 61 (+52.5%)
GapFlytGapFlyt: Active Vision Based Minimalist Structure-less Gap Detection For Quadrotor Flight
Stars: ✭ 30 (-25%)
jeelizPupillometryReal-time pupillometry in the web browser using a 4K webcam video feed processed by this WebGL/Javascript library. 2 demo experiments are included.
Stars: ✭ 78 (+95%)
SentryPeerA distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (+170%)
MonoRUn[CVPR'21] MonoRUn: Monocular 3D Object Detection by Reconstruction and Uncertainty Propagation
Stars: ✭ 85 (+112.5%)
KARENKAREN: Unifying Hatespeech Detection and Benchmarking
Stars: ✭ 18 (-55%)
object-trackingMultiple Object Tracking System in Keras + (Detection Network - YOLO)
Stars: ✭ 89 (+122.5%)
AutoLabelImgA self automatically labeling tool
Stars: ✭ 67 (+67.5%)
SubcertSubcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (+45%)
diwaA Deliberately Insecure Web Application
Stars: ✭ 32 (-20%)
odamODAM - Object detection and Monitoring
Stars: ✭ 16 (-60%)
netdisco🔎 Python library to scan local network for services and devices.
Stars: ✭ 252 (+530%)
giggerGit folder digger, I'm sure it's worthwhile stuff.
Stars: ✭ 39 (-2.5%)
seahorseELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)
Stars: ✭ 31 (-22.5%)
pyetiPython bindings for Yeti's API
Stars: ✭ 15 (-62.5%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (+15%)
Comet.BoxCollection of Object Detection and Segmentation Pipelines🛸🚀
Stars: ✭ 24 (-40%)
Mask-YOLOInspired from Mask R-CNN to build a multi-task learning, two-branch architecture: one branch based on YOLOv2 for object detection, the other branch for instance segmentation. Simply tested on Rice and Shapes. MobileNet supported.
Stars: ✭ 100 (+150%)
VirusX5The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-62.5%)
mdnsdJeremie Miller's original mdnsd
Stars: ✭ 43 (+7.5%)
mitmA simple yet effective python3 script to perform DNS spoofing via ARP poisoning
Stars: ✭ 23 (-42.5%)
volkscvA Python toolbox for computer vision research and project
Stars: ✭ 58 (+45%)
dystopiaLow to medium multithreaded Ubuntu Core honeypot coded in Python.
Stars: ✭ 59 (+47.5%)
mmrazorOpenMMLab Model Compression Toolbox and Benchmark.
Stars: ✭ 644 (+1510%)
ElasticpotPYElasticsearch honeypot written in Python with Bottle framework
Stars: ✭ 16 (-60%)
Caffe2-yolo-v3A Caffe2 implementation of the YOLO v3 object detection algorithm
Stars: ✭ 32 (-20%)
detectionDetection in the form of Yara, Snort and ClamAV signatures.
Stars: ✭ 70 (+75%)
TiEtwAgentPoC memory injection detection agent based on ETW, for offensive and defensive research purposes
Stars: ✭ 135 (+237.5%)
clap-detectionSimple clap rhythm detection on Raspberry Pi using Csound and Python. Toy example.
Stars: ✭ 29 (-27.5%)
ExploitsA personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
Stars: ✭ 75 (+87.5%)
mdns-tunnellerTunnels two (or more) mDNS domains together
Stars: ✭ 74 (+85%)
Damn-Vulnerable-BankDamn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.
Stars: ✭ 379 (+847.5%)
music-id🚀 Music ID for Twitch (TwitchMusicID) is a Chatbot which automatically identifies music in the background of Twitch Streams, VODs, and Clips.
Stars: ✭ 49 (+22.5%)
radialeWhat if home automation was homoiconic? Just transformations of data? No more YAML!
Stars: ✭ 21 (-47.5%)
FCOS.Pytorchfcos implementation in pytorch1.x
Stars: ✭ 84 (+110%)
massurlA simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau
Stars: ✭ 14 (-65%)
AutomataAutomatic detection engineering technical state compliance
Stars: ✭ 33 (-17.5%)