All Projects → aeacus → Similar Projects or Alternatives

346 Open source projects that are alternatives of or similar to aeacus

URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+94.23%)
Mutual labels:  cybersecurity
CTF-Write-UP
澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (-48.08%)
Mutual labels:  cybersecurity
mitrecnd.github.io
MITRE Shield website
Stars: ✭ 17 (-67.31%)
Mutual labels:  cybersecurity
awesome-cloud-security
🛡️ Awesome Cloud Security Resources ⚔️
Stars: ✭ 1,056 (+1930.77%)
Mutual labels:  cybersecurity
digital-copyright
Stamp your code with a trackable digital copyright
Stars: ✭ 17 (-67.31%)
Mutual labels:  cybersecurity
domfind
A Python DNS crawler to find identical domain names under different TLDs.
Stars: ✭ 22 (-57.69%)
Mutual labels:  cybersecurity
Malicious-Urlv5
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (-32.69%)
Mutual labels:  cybersecurity
aurora
Malware similarity platform with modularity in mind.
Stars: ✭ 70 (+34.62%)
Mutual labels:  cybersecurity
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+61.54%)
Mutual labels:  cybersecurity
dorothy
Dorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (+63.46%)
Mutual labels:  cybersecurity
adv-dnn-ens-malware
adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (-36.54%)
Mutual labels:  cybersecurity
Powerexploit
Post-Exploitation 😎 module for Penetration Tester and Hackers.
Stars: ✭ 26 (-50%)
Mutual labels:  vulnerability-assessment
recommendations-for-engineers
All of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 81 (+55.77%)
Mutual labels:  cybersecurity
CTF-Writeups
Repository of my CTF writeups
Stars: ✭ 25 (-51.92%)
Mutual labels:  cybersecurity
go-spyse
The official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-51.92%)
Mutual labels:  cybersecurity
incident-response-plan-template
A concise, directive, specific, flexible, and free incident response plan template
Stars: ✭ 288 (+453.85%)
Mutual labels:  cybersecurity
Practical Malware Analysis
Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✭ 16 (-69.23%)
Mutual labels:  cybersecurity
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+34.62%)
Mutual labels:  cybersecurity
know your ip
Know Your IP: Get location, blacklist status, shodan and censys results, and more.
Stars: ✭ 16 (-69.23%)
Mutual labels:  cybersecurity
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (+34.62%)
Mutual labels:  cybersecurity
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+44.23%)
Mutual labels:  cybersecurity
idsa
This is the main repository of International Data Spaces Association on GitHub, where you can find general overview and required information on IDS Open Source Landscape.
Stars: ✭ 22 (-57.69%)
Mutual labels:  cybersecurity
TheRoadOfSO
学习安全运营的记录 | The knowledge base of security operation
Stars: ✭ 286 (+450%)
Mutual labels:  cybersecurity
client-python
OpenCTI Python Client
Stars: ✭ 45 (-13.46%)
Mutual labels:  cybersecurity
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-44.23%)
Mutual labels:  cybersecurity
Cyber-Security
This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (-19.23%)
Mutual labels:  cybersecurity
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+51.92%)
Mutual labels:  cybersecurity
SentryPeer
A distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (+107.69%)
Mutual labels:  cybersecurity
SuperLibrary
Information Security Library
Stars: ✭ 60 (+15.38%)
Mutual labels:  cybersecurity
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+934.62%)
Mutual labels:  cybersecurity
SecurityInterviewGuide
网络信息安全从业者面试指南
Stars: ✭ 791 (+1421.15%)
Mutual labels:  cybersecurity
firecracker
Stop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+742.31%)
Mutual labels:  cybersecurity
www-project-zap
OWASP Zed Attack Proxy project landing page.
Stars: ✭ 52 (+0%)
Mutual labels:  vulnerability-assessment
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+63.46%)
Mutual labels:  cybersecurity
netizenship
a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-36.54%)
Mutual labels:  cybersecurity
sike-java
SIKE for Java is a software library that implements experimental supersingular isogeny cryptographic schemes that aim to provide protection against attackers running a large-scale quantum computer.
Stars: ✭ 28 (-46.15%)
Mutual labels:  cybersecurity
LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+132.69%)
Mutual labels:  cybersecurity
awesome-security-feed
A semi-curated list of Security Feeds
Stars: ✭ 64 (+23.08%)
Mutual labels:  cybersecurity
attack to veris
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (+7.69%)
Mutual labels:  cybersecurity
pyiocutils
A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).
Stars: ✭ 18 (-65.38%)
Mutual labels:  cybersecurity
MOSP
A collaborative platform for creating, editing and sharing JSON objects.
Stars: ✭ 72 (+38.46%)
Mutual labels:  cybersecurity
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (+165.38%)
Mutual labels:  cybersecurity
ADLES
Automated Deployment of Lab Environments System (ADLES)
Stars: ✭ 28 (-46.15%)
Mutual labels:  cybersecurity
gsvsoc cirt-playbook-battle-cards
Cyber Incident Response Team Playbook Battle Cards
Stars: ✭ 142 (+173.08%)
Mutual labels:  cybersecurity
mitreattack-python
A python module for working with ATT&CK
Stars: ✭ 208 (+300%)
Mutual labels:  cybersecurity
Libellux-Up-and-Running
Libellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-63.46%)
Mutual labels:  vulnerability-assessment
RdpCacheStitcher
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+238.46%)
Mutual labels:  cybersecurity
attack-stix-data
STIX data representing MITRE ATT&CK
Stars: ✭ 118 (+126.92%)
Mutual labels:  cybersecurity
DomainCAT
Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
Stars: ✭ 34 (-34.62%)
Mutual labels:  cybersecurity
erebus
Erebus is a fast tool for parameter-based vulnerability scanning using a Yaml based template engine like nuclei.
Stars: ✭ 72 (+38.46%)
Mutual labels:  vulnerability-assessment
Hack4Squad
💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-13.46%)
Mutual labels:  cybersecurity
GDPatrol
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (-3.85%)
Mutual labels:  cybersecurity
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+17.31%)
Mutual labels:  cybersecurity
security-guidance
Security guidance from the MOJ Digital & Technology Cybersecurity team
Stars: ✭ 14 (-73.08%)
Mutual labels:  cybersecurity
teye scanner for book
《白帽子讲Web扫描》书籍参考代码
Stars: ✭ 101 (+94.23%)
Mutual labels:  vulnerability-assessment
SCANNER-INURLBR
Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (+73.08%)
Mutual labels:  cybersecurity
WiFi-Project
Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-57.69%)
Mutual labels:  cybersecurity
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-26.92%)
Mutual labels:  cybersecurity
ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (+396.15%)
Mutual labels:  cybersecurity
rstthreats
Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-67.31%)
Mutual labels:  cybersecurity
61-120 of 346 similar projects