There are 4 repositories under threats topic.
Comprehensive domain blocklists for 🚨 threats (🕷malware, 🎣phishing, 🕵️spyware, 🤖botnets). Ideal for DNS-based filtering tools like Pi-Hole, AdGuard Home, Blocky.
Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.
Shell Script to download NRD(Newly Registered Domain) list for free
Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.
A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.
Protect your users against malware and phishing threats using Google Safe Browsing
Official Javascript Client for Ipregistry: a Non-Intrusive Solution for IP Geolocation and Threat Data.
:mag_right: A node utility to scan a domain with various techniques.
This repository has a tool and an API for Saudi CERT alerts. Its goal is to help improve the level of cybersecurity awareness in Saudi Arabia. Using AWS Lambda, this project takes Saudi CERT's alerts, organizes them, and makes them easy to get through a public API.
Multi-action conservation planning
automated security scanner for sql-injection and Cross site scripting made in python 3.7 using the python selenium-python automation module and beautiful soup web scrapper module
Analyst tools to speed up interacting with the Blockade cloud node
templated content for easy usage
Scenario: Working as a Security Engineer for X-CORP, supporting the SOC infrastructure. The SOC Analysts have noticed some discrepancies with alerting in the Kibana system and the manager has asked the Security Engineering team to investigate. Started with confirming that newly created Kibana alerts are working, after which monitored live traffic on the wire to detect any abnormalities that aren't reflected in the alerting system. Reported back all findings to both the SOC manager and the Engineering Manager with appropriate analysis.
Every resource about Android security is here.
Training materials and code examples using Python in security-related tasks. The focus is on teaching users how to use Python to automate common security tasks, such as vulnerability scanning, penetration testing, and network monitoring.
All of my work for the past 6 months as a cyber risk researcher for University of Greenwich. A total of 41 literature reviews and analysis as white papers to develop the final survey paper
Weekly updates of personally collected threat intelligence (threat IP),The intelligence list is updated weekly to ensure reliability
:clipboard: Proof of Concept of the Vulnerability Framework
Malware Detection Using Machine Learning and Deep Learning Algorithms where highest Accuracy get 95%
A process viewer for Linux (warn early development Alpha)
Automatic import of UFW rules for daily generated IP-blacklists.
Mr Kyoashi is very famous man, he recently open new lab in spain , which can perform experiments on Quantum Physics, Computer. However yesterday, on conference he discuss about his achievement, that is Quantum Teleportation. QT open new areas in physics, perhaps it also allow new threats. One of the big, event happen on morning , somebody kidnapped Mr Kyoashi at his home.
Secure your clicks with every URL scan
Una solución al problema del productor y el consumidor usando monitores
Website to practice spotting immediate threats and Tinues for the beautiful board game of Tak
Information and Training Projects for the role as a Cyber Defender/Information Security Analyst