Skip to content
View Dark-Pr0xy's full-sized avatar
💭
I may be slow to respond.
💭
I may be slow to respond.

Block or report Dark-Pr0xy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Beta Lists are currently in beta. Share feedback and report bugs.

Starred repositories

Showing results

Monitor and restart unhealthy docker containers.

Shell 1,293 225 Updated Mar 30, 2024

Advanced OT Cyber Security (ICS-DCS-SCADA), by EC-Council

Python 2 1 Updated Jun 21, 2024

TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.

Jupyter Notebook 429 92 Updated Jun 10, 2024

Repo for user submitted stencils

9 Updated Jun 9, 2022

4,450 visio 🎨 shapes, stencils, symbols, and icons collection to visually represent your IT infrastructure

Shell 393 132 Updated Aug 25, 2024

Digital Bond's ICS Enumeration Tools

Lua 430 145 Updated Mar 10, 2020

smod is a modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol

Python 1 Updated May 2, 2019
Pascal 2 Updated Apr 12, 2024

Automation tool for Windows Deception Host Burn-In

Go 68 7 Updated Jul 2, 2024

Never ever ever use pixelation as a redaction technique

TypeScript 7,716 712 Updated Mar 15, 2024

A Upnp exploitation tool.

Python 102 54 Updated Oct 27, 2019

🐬 Feature-rich, stable and customizable Flipper Firmware

C 3,973 151 Updated Sep 7, 2024

A curated list of awesome Memory Forensics for DFIR

316 45 Updated Nov 5, 2023

The open source Tines / Splunk SOAR alternative.

Python 2,336 158 Updated Sep 10, 2024

Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)

C++ 384 71 Updated Apr 21, 2023

The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to support vulnerability analysis for the ICS/OT community. This is …

70 20 Updated Sep 6, 2024

Controls Assessment Specification

Makefile 65 53 Updated Jun 3, 2024

A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).

Makefile 64 11 Updated May 3, 2024

NIST 800-53 Baseline Configuration Tool

7 2 Updated Aug 23, 2024

MITRE ATT&CK Based App in Power BI

10 2 Updated Feb 23, 2024

An API and client for managing STIG assessments

JavaScript 111 29 Updated Sep 9, 2024

Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Th…

Python 2,917 442 Updated Jul 17, 2024

Lists of products useful for ICS security

92 29 Updated Jun 24, 2024

This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar…

Jupyter Notebook 18,244 3,237 Updated Sep 5, 2024

MBC content in markdown

357 43 Updated Aug 25, 2024

Labs for Practical Malware Analysis & Triage

HCL 835 197 Updated Sep 1, 2024

Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!

Python 1 Updated Jan 31, 2022

Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com

PowerShell 6,882 1,281 Updated Sep 10, 2024
Next