qeeqbox Goto Github PK
Name: QeeqBox
Type: Organization
Bio: State-of-the-art opensource projects and services for red, purple, and blue teams
Location: Washington, USA
Blog: qeeqbox.com
Name: QeeqBox
Type: Organization
Bio: State-of-the-art opensource projects and services for red, purple, and blue teams
Location: Washington, USA
Blog: qeeqbox.com
Github Settings
Access Control is using security techniques to protect a system against unauthorized access
Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)
Some extracted Features\IoCs\Artifacts\Patterns from APT Malware
asynico websockets redis server (Needed for internal testing)
A threat actor may gain access to data and functionalities by bypassing the target authentication mechanism
A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier
JSON file that contains an update metadata of Automation Protocols (Industrial control system, process automation, building automation, automatic meter reading, and automobile)
A threat actor may bypass the Completely Automated Public Turing test to tell Computers and Humans Apart (captcha) by breaking the solving logic, human-assisted solving services, or utilizing automated technology
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
A threat actor may trick a victim into executing native template syntax on a vulnerable target
JSON file contains all countries metadata (Country name, cc, a3, and flag)
A threat actor may guess the target credentials using a known username and password pairs gathered from previous brute-force attacks
A threat actor may trick an authenticated or trusted victim into executing unauthorized actions on their behalf
A collection of attacks metadata that were used in my previous pen-test tools
Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks
Cybersecurity is the measures taken to protect networks, devices, and data against cyberattacks
Data classification defines and categorizes data according to its type, sensitivity, and value
Data compliance is the process of following various regulations and standards to ensure that sensitive digital assets (data) are guarded against loss, theft, and misuse
Data Lifecycle Management (DLM) is a policy-based model for managing data in an organization
Safeguarding your personal information (How your info is protected)
Data states refer to structured and unstructured data divided into three categories (At Rest, In Use, and In Transit)
A threat actor may gain unauthorized access using the default username and password
Digital Forensics is the process of finding and analyzing electronic data
A threat actor may list files on a misconfigured server
Kali and Parrot OS docker images accessible via VNC, RDP and Web
A threat actor may inject malicious content into HTTP requests. The content is not reflected in the HTTP response and executed in the victim's browser.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.