-
# Task Description: Cyber Security Dashboard
## Background
As a company dealing with sensitive data, it is crucial to keep track of our cyber security stats to ensure the safety and integrity of…
-
### Request Type
Feature Request
### Problem Description
The current ticketing system of theHive follows the below workflow:
Ticket state : Waiting
Event : Someone assigns the ticket to hi…
-
**Description of the bug or feature request**
When using phishing manager with a custom template with login form like username / password
CredMonitor / Net Credentials is not capturing any inputs.…
-
I noticed when looking at a PR that there are some links which have broken over time. Egregiously, there are a few links to a website called `node-tricks.com` which is now serving up some kind of phis…
-
## Project Request
The problem statement urges the need to use Machine Learning techniques such as logistic regression and nlp concept of sentiment analysis to predict the mail as Spam or Ham
--…
-
From few days . Termux tools which generate ngrok links have stopped working. CamPhish, camdumper, Zphisher , adv phishing etc tools which generate ngrok links are not generating links .
It is …
-
In this activity, you will review the details of a security incident and document the incident using your incident handler's journal. Previously, you learned about the importance of documentation in t…
-
The page in which gmail asks for your phone number in order to send you a code.
It's useful if you are looking for the phone number of the person.
-
### Prize Title
Ethereum Data Analytics Bounty
### Prize Bounty
- 1st - 2250 USDC & 1 Vigilante NFT
- 2nd - 1250 USDC
- 3rd - 500 USDC
### Challenge Description
In this bounty, part…
-
1. Use id for all tables (lowercase)
2. FKs fields will become e.g. tblContactsId
3. Use Camel case for field names, e.g. firstName
4. No underscores in object names, e.g. lstContacts and not lst_C…