#
threats
Here are 24 public repositories matching this topic...
zBang is a risk assessment tool that detects potential privileged account threats
active-directory
privileges
scan-tool
risk-assessment
threats
network-security
security-tools
attack-defense
-
Updated
Nov 15, 2021 - C#
Blackbook of malware domains
-
Updated
Mar 9, 2022
Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.
-
Updated
Dec 6, 2020 - JavaScript
UEBA Solution for Insider Security. This repo is archived. Thanks!
nodejs
javascript
npm
flask
machine-learning
express
spark
hadoop
analytics
tensorflow
detection
keras
python3
d3js
threats
uba
user-behaviour
-
Updated
Feb 28, 2020 - Python
Protect your users against malware and phishing threats using Google Safe Browsing
swift
swift-library
security
google
api-wrapper
threats
phising
protect-your-privacy
safe-browsing
malware-detection
safebrowsing
google-safebrowsing
-
Updated
Mar 4, 2019 - Swift
Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.
api
intelligence
query
geoip
malware-research
hashes
domain-name
threatgrid
sinkhole
rbl
whois-lookup
threats
virustotal
otx
ip-address-lookup
dbl
emerging
quad9
threat-triage
seclytics
-
Updated
Feb 13, 2022 - VBScript
A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.
security
spam
database
consul
proxy
regex
regular-expression
grpc
tor
zookeeper
vpn
restful-api
threats
security-automation
security-tools
etcdv3
threat-detection
modern-threats
grpc-protocols
fraud-scores
-
Updated
Mar 8, 2022 - Go
Official Javascript Client for Ipregistry: a Non-Intrusive Solution for IP Geolocation and Threat Data.
-
Updated
Mar 7, 2022 - TypeScript
Analyst tools to speed up interacting with the Blockade cloud node
-
Updated
Oct 21, 2021 - Python
-
Updated
Sep 10, 2020 - JavaScript
automated security scanner for sql-injection and Cross site scripting made in python 3.7 using the python selenium-python automation module and beautiful soup web scrapper module
-
Updated
Oct 27, 2021 - PHP
CATRACA: An sCAlable TRAffic Classifier and Analyzer
-
Updated
May 8, 2018 - Python
Multi-action conservation planning
-
Updated
Feb 28, 2022 - R
Scenario: Working as a Security Engineer for X-CORP, supporting the SOC infrastructure. The SOC Analysts have noticed some discrepancies with alerting in the Kibana system and the manager has asked the Security Engineering team to investigate. Started with confirming that newly created Kibana alerts are working, after which monitored live traffic on the wire to detect any abnormalities that aren't reflected in the alerting system. Reported back all findings to both the SOC manager and the Engineering Manager with appropriate analysis.
wordpress
vm
kibana
topology
azure
presentation
filebeat
reporting
elk
wireshark
metricbeat
implementation
kali-linux
threats
attacks
blueteam
redteam
-
Updated
Jan 19, 2022
Templated content for easy usage
-
Updated
Jan 14, 2022
A process viewer for Linux (warn early development Alpha)
-
Updated
Aug 24, 2017 - C++
Mr Kyoashi is very famous man, he recently open new lab in spain , which can perform experiments on Quantum Physics, Computer. However yesterday, on conference he discuss about his achievement, that is Quantum Teleportation. QT open new areas in physics, perhaps it also allow new threats. One of the big, event happen on morning , somebody kidnapped Mr Kyoashi at his home.
morning
csharp
unity
conference
lab
omega
quantum-teleportation
threats
spain
quantum-physics
achievement
-
Updated
Dec 25, 2019 - ASP
-
Updated
Nov 4, 2021
Improve this page
Add a description, image, and links to the threats topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the threats topic, visit your repo's landing page and select "manage topics."
"AA03": { "description": "Weakness in SSO Authorization", "source": (Process, Element), "target": (Process, Server), "condition": "target.implementsAuthenticationScheme is False", },What if the Process implements BasicAuth or uses mutual TLS (neither of which is SSO)?
If the Process uses SAML or OAuth, then maybe.
Maybe authenticationScheme as a string var is neces