All Categories → Security → cybersecurity

Top 307 cybersecurity open source projects

Intelmq
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Violent Python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Opcde
OPCDE Cybersecurity Conference Materials
Logkeys
📝 ⌨️ A GNU/Linux keylogger that works!
Car
Cyber Analytics Repository
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Berty
Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network
Shuffle
Shuffle: A general purpose security automation platform platform. We focus on accessibility for all.
Otseca
Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Buster
An advanced tool for email reconnaissance
Flare
An analytical framework for network traffic and behavioral analytics
Webmap
WebMap-Nmap Web Dashboard and Reporting
Watcher
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Cybersecurity
A curriculum for a high school cyber security course.
Nmapgui
Advanced Graphical User Interface for NMap
Ir Rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Malsub
A Python RESTful API framework for online malware analysis and threat intelligence services.
Ccat
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Adversary emulation library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Chepy
Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
Attack Scripts
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Subzy
Subdomain takeover vulnerability checker
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Red-Team-Essentials
This repo will contain some basic pentest/RT commands.
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
WiFi-Project
Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Sherlock
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
domfind
A Python DNS crawler to find identical domain names under different TLDs.
RecoverPy
🙈 Interactively find and recover deleted or 👉 overwritten 👈 files from your terminal
idsa
This is the main repository of International Data Spaces Association on GitHub, where you can find general overview and required information on IDS Open Source Landscape.
CyberICS.github.io
News and publication on cybersecurity in industry
awesome-security-feed
A semi-curated list of Security Feeds
security-guidance
Security guidance from the MOJ Digital & Technology Cybersecurity team
rstthreats
Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
CTF-Write-UP
澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
121-180 of 307 cybersecurity projects