Wonder39's repositories
awesome-books
160+ 本技术类精华电子书开源了,免费下载,包括 前端、后端、数据结构与算法、计算机基础、设计模式、数据库等书籍
awesome-ml-for-cybersecurity
:octocat: Machine Learning for Cyber Security
brutespray
Brute-Forcing from Nmap output - Automatically attempts default creds on found services.
CICFlowMeter
CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has been used in many Cybersecurity datsets such as Android Adware-General Malware dataset (CICAAGM2017), IPS/IDS dataset (CICIDS2017), Android Malware dataset (CICAndMal2017) and Distributed Denial of Service (CICDDoS2019).
CVE-2021-3493
Ubuntu OverlayFS Local Privesc
cve_for_today
A script to fetch today new update cve info
fapro
Fake Protocol Server
free-google-translate
Free Google Translator API 免费的Google翻译
hunting-rules
Suricata rules for network anomaly detection
ISEAA-DJBHCP
等级保护测评工作的培训和经验总结
jd_seckill
fork huanghyw/jd_seckill
MalwareDatabase
This repository is one of a few malware collections on the GitHub.
MalwareTrainingSets
Free Malware Training Datasets for Machine Learning
Microsoft-Activation-Scripts
A collection of scripts for activating Microsoft products using HWID / KMS38 / Online KMS activation methods with a focus on open-source code, less antivirus detection and user-friendliness.
minimage
Minimal Docker images: a collection of Dockerfiles illustrating how to reduce container image size.
mysql
Docker Official Image packaging for MySQL Community Server
patator
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
poky-container
A container image that is able to run bitbake/poky. It has helpers to create users and groups within the container. This is so that the output generated in the container will be readable by the user on the host.
pulledpork
Pulled Pork for Snort and Suricata rule management (from Google code)
Quickdraw-Snort
Digital Bond's IDS/IPS rules for ICS and ICS protocols.
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
SMBGhost
Scanner for CVE-2020-0796 - SMBv3 RCE
snort-rules
An UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
SOREL-20M
Sophos-ReversingLabs 20 million sample dataset
theZoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
tpotce
🍯 T-Pot - The All In One Honeypot Platform 🐝
yocto-dockerfiles
This repository is for -base and -builder containers for building derivative containers (such as poky-container) for containerized Yocto Project builds.