NfstreamNFStream: a Flexible Network Data Analysis Framework.
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
KeyloggerGet Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Violent Python3Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
OpcdeOPCDE Cybersecurity Conference Materials
Logkeys📝 ⌨️ A GNU/Linux keylogger that works!
CarCyber Analytics Repository
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
BertyBerty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network
ShuffleShuffle: A general purpose security automation platform platform. We focus on accessibility for all.
OtsecaOpen source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
BusterAn advanced tool for email reconnaissance
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
FlareAn analytical framework for network traffic and behavioral analytics
WebmapWebMap-Nmap Web Dashboard and Reporting
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
CybersecurityA curriculum for a high school cyber security course.
NmapguiAdvanced Graphical User Interface for NMap
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
MalsubA Python RESTful API framework for online malware analysis and threat intelligence services.
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
CcatCloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Adversary emulation libraryAn open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
ChepyChepy is a python lib/cli equivalent of the awesome CyberChef tool.
Attack ScriptsScripts and a (future) library to improve users' interactions with the ATT&CK content
SubzySubdomain takeover vulnerability checker
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
FakeUSBMake your own BadUSB device!
aeacus🔐 Vulnerability remediation scoring system
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
ImpulsiveDLLHijackC# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
domfindA Python DNS crawler to find identical domain names under different TLDs.
RecoverPy🙈 Interactively find and recover deleted or 👉 overwritten 👈 files from your terminal
idsaThis is the main repository of International Data Spaces Association on GitHub, where you can find general overview and required information on IDS Open Source Landscape.
WebspoiltThis script will you help to find the information about the website and to help in penetrating testing
security-guidanceSecurity guidance from the MOJ Digital & Technology Cybersecurity team
rstthreatsAggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
CTF-Write-UP澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF