dis0ps's Stars
thu-vu92/local-llms-analyse-finance
In this project, I explored how local LLMs can be used to label data and support analyses. Specifically, I used Llama2 model to automatically categorise my bank transaction data.
bluemountaincyber/building-detections-azure
ollama/ollama
Get up and running with Llama 3.3, Mistral, Gemma 2, and other large language models.
nix-community/NixOS-WSL
NixOS on WSL(2) [maintainer=@nzbr]
balsoft/kalinix
A pentesting/CTF toolbox with the help of Nix
Misterio77/nix-starter-configs
Simple and documented config templates to help you get started with NixOS + home-manager + flakes. All the boilerplate you need!
lucperkins/nix-home-config
Nix configuration for my macOS laptop
JaKooLit/Hyprland-Dots
Hyprland dotfiles - used as main repo for all my Hyprland Install Scripts.
deadbits/trs
🔭 Threat report analysis via LLM and Vector DB
deadbits/vigil-llm
⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs
donnemartin/system-design-primer
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
its-a-feature/Mythic
A collaborative, multi-platform, red teaming framework
muraenateam/muraena
Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
RhinoSecurityLabs/cloudgoat
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
infosecn1nja/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
timb-machine/linux-malware
Tracking interesting Linux (and UNIX) malware. Send PRs
jkroepke/helm-secrets
A helm plugin that help manage secrets with Git workflow and store them anywhere
samknight/slack_applescript
AppleScript bundle for Slack methods
Anof-cyber/Application-Security
Resources for Application Security including Web, API, Android, iOS and Thick Client
polarityio/threatconnect-ioc-submission
muraenateam/necrobrowser
necromantic session control
TalEliyahu/awesome-CISO-maturity-models
Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guidance for quality processes, and provide benchmark for appraising current processes outcomes.
karimhabush/cyberowl
A daily updated summary of the most frequent types of security advisories currently being reported from different sources.
NextronSystems/evtx-baseline
A repository hosting example goodware evtx logs containing sample software installation and basic user interaction
usnistgov/oscal-content
NIST SP 800-53 content and other OSCAL content examples
splunk/go-splunk-client
deepfence/PacketStreamer
:star: :star: Distributed tcpdump for cloud native environments :star: :star:
ansible/awx
AWX provides a web-based user interface, REST API, and task engine built on top of Ansible. It is one of the upstream projects for Red Hat Ansible Automation Platform.
google/docker-explorer
A tool to help forensicate offline docker acquisitions
lukemonahan/splunk_modinput_prometheus
A Splunk modular input for ingesting Prometheus metrics