threats
Here are 42 public repositories matching this topic...
A Pythonic framework for threat modeling
-
Updated
Nov 11, 2024 - Python
zBang is a risk assessment tool that detects potential privileged account threats
-
Updated
Aug 3, 2022 - C#
Blackbook of malware domains
-
Updated
Sep 1, 2024
Comprehensive domain blocklists for 🚨 threats (🕷malware, 🎣phishing, 🕵️spyware, 🤖botnets). Ideal for DNS-based filtering tools like Pi-Hole, AdGuard Home, Blocky.
-
Updated
Mar 6, 2024
Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.
-
Updated
Dec 6, 2020 - JavaScript
UEBA Solution for Insider Security. This repo is archived. Thanks!
-
Updated
Feb 28, 2020 - Python
Shell Script to download NRD(Newly Registered Domain) list for free
-
Updated
Jun 15, 2023 - Shell
A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.
-
Updated
Sep 12, 2024
Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.
-
Updated
Sep 2, 2024 - VBScript
A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.
-
Updated
Mar 13, 2024 - Go
Protect your users against malware and phishing threats using Google Safe Browsing
-
Updated
Mar 4, 2019 - Swift
Official Javascript Client for Ipregistry: a Non-Intrusive Solution for IP Geolocation and Threat Data.
-
Updated
Sep 2, 2024 - TypeScript
🔎 A node utility to scan a domain with various techniques.
-
Updated
Sep 10, 2020 - JavaScript
This repository has a tool and an API for Saudi CERT alerts. Its goal is to help improve the level of cybersecurity awareness in Saudi Arabia. Using AWS Lambda, this project takes Saudi CERT's alerts, organizes them, and makes them easy to get through a public API.
-
Updated
Nov 16, 2023 - Python
Multi-action conservation planning
-
Updated
Sep 18, 2024 - R
In this course, I build an understanding of the wide range of assets organizations must protect. Explored many of the most common security controls used to protect valuable assets from risk. Also discovered the variety of ways assets are vulnerable to threats by adopting an attacker mindset.
-
Updated
Aug 18, 2024 - Jupyter Notebook
automated security scanner for sql-injection and Cross site scripting made in python 3.7 using the python selenium-python automation module and beautiful soup web scrapper module
-
Updated
Oct 27, 2021 - PHP
Analyst tools to speed up interacting with the Blockade cloud node
-
Updated
Dec 7, 2022 - Python
Improve this page
Add a description, image, and links to the threats topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the threats topic, visit your repo's landing page and select "manage topics."