Lists (1)
Sort Name ascending (A-Z)
Stars
Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
Shadow is a discrete-event network simulator that directly executes real application code, enabling you to simulate distributed systems with thousands of network-connected processes in realistic an…
Lists of addresses of the most active C2, Botnets, Zombies, Scanners DST = France & Belgium
🛡️ Open-source and next-generation Web Application Firewall (WAF)
Launch your SOC as fast as a rocket with only one command
A collection of snippets of codes and commands to make your life easier!
Gradio-powered application that converts audio recordings of meetings into transcripts and provides concise summaries using whisper.
Useful resources for SOC Analyst and SOC Analyst candidates.
📓 Reference guide for scanning networks with Nmap.
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
SOC Analyst Level 1 Replacement using RAG LLM
Un BOT Vinted totalement gratuit ! Il vous permettra de faire du resell dans la plus grande facilité le meilleur bot que vous trouverez :) ! Il est lié à Discord et vous pourrez modifier vos choix …
The Chain of Custody form is a critical element to a forensic investigation because examiners use it to record the history of the evidence from the time it is found until the case is closed or goes…
Open Source Grafana Plugin for querying MongoDB
Your AI second brain. Self-hostable. Get answers from the web or your docs. Build custom agents, schedule automations, do deep research. Turn any online or local LLM into your personal, autonomous …
GPTAggregator is a Python-based application that provides a unified interface to interact with various large language models (LLMs) through their respective APIs. The project aims to simplify the p…