jasontrost-databricks's Stars
adulau/HHHash
HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.
0x706972686f/RMM-Catalogue
openchatai/OpenCopilot
🤖 🔥 Language-to-actions engine
misterch0c/what_is_this_c2
For all these times you're asking yourself "what is this panel again?"
fr0gger/Awesome-GPT-Agents
A curated list of GPT agents for cybersecurity
fkie-cad/amides
An Adaptive Misuse Detection System
gitleaks/gitleaks
Protect and discover secrets using Gitleaks 🔑
jischell-msft/RemoteManagementMonitoringTools
Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations
attackgithub/bdvl
LD_PRELOAD Linux rootkit (x86 & ARM)
LauraWartschinski/VulnerabilityDetection
vulnerability detection in python source code with LSTM networks
spinscale/seccomp-samples
A few seccomp samples, that can be run in a vagrant VM
pruzko/hakuin
A blazing fast Blind SQL Injection optimization and automation framework.
mit-han-lab/streaming-llm
[ICLR 2024] Efficient Streaming Language Models with Attention Sinks
Bert-JanP/Open-Source-Threat-Intel-Feeds
This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash.
0x4D31/awesome-threat-detection
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
infosecB/awesome-detection-engineering
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.
OpenInterpreter/open-interpreter
A natural language interface for computers
malienist/vovk
Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.
jthack/PIPE
Prompt Injection Primer for Engineers
vulncheck-oss/go-exploit
A Go-based Exploit Framework
stratosphereips/NetSecGame
An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project
izysec/linux-audit
Some resources to facilitate my blog on auditd for security monitoring
Antonlovesdnb/DockerDetectionNotes
Some of my rough notes for Docker threat detection
mallorybowes/chrome-mal-ids
Effort to list and aggregate known malicious Google Chrome Extension IDs
grantho/lateral-movement-simulator
A framework for synthesizing lateral movement login data.
elastic/SWAT
Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK framework.
sroberts/awesome-iocs
A collection of sources of indicators of compromise.
mrtouch93/awesome-security-feed
A semi-curated list of Security Feeds
vectra-ai-research/derf
DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation of repeatable detection samples in the cloud. Built on Google Workflows
geekan/MetaGPT
🌟 The Multi-Agent Framework: First AI Software Company, Towards Natural Language Programming