Giter Site home page Giter Site logo

QeeqBox's Projects

access-control icon access-control

Access Control is using security techniques to protect a system against unauthorized access

analyzer icon analyzer

Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)

authentication-bypass icon authentication-bypass

A threat actor may gain access to data and functionalities by bypassing the target authentication mechanism

authorization-bypass icon authorization-bypass

A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier

automation-protocols-metadata icon automation-protocols-metadata

JSON file that contains an update metadata of Automation Protocols (Industrial control system, process automation, building automation, automatic meter reading, and automobile)

captcha-bypass icon captcha-bypass

A threat actor may bypass the Completely Automated Public Turing test to tell Computers and Humans Apart (captcha) by breaking the solving logic, human-assisted solving services, or utilizing automated technology

chameleon icon chameleon

19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)

credential-stuffing icon credential-stuffing

A threat actor may guess the target credentials using a known username and password pairs gathered from previous brute-force attacks

cross-site-request-forgery icon cross-site-request-forgery

A threat actor may trick an authenticated or trusted victim into executing unauthorized actions on their behalf

cyber-attacks icon cyber-attacks

A collection of attacks metadata that were used in my previous pen-test tools

cyber-kill-chain icon cyber-kill-chain

Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks

cybersecurity icon cybersecurity

Cybersecurity is the measures taken to protect networks, devices, and data against cyberattacks

data-classification icon data-classification

Data classification defines and categorizes data according to its type, sensitivity, and value

data-compliance icon data-compliance

Data compliance is the process of following various regulations and standards to ensure that sensitive digital assets (data) are guarded against loss, theft, and misuse

data-security icon data-security

Safeguarding your personal information (How your info is protected)

data-states icon data-states

Data states refer to structured and unstructured data divided into three categories (At Rest, In Use, and In Transit)

default-credential icon default-credential

A threat actor may gain unauthorized access using the default username and password

docker-images icon docker-images

Kali and Parrot OS docker images accessible via VNC, RDP and Web

dom-based-cross-site-scripting icon dom-based-cross-site-scripting

A threat actor may inject malicious content into HTTP requests. The content is not reflected in the HTTP response and executed in the victim's browser.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.