CyberQueensCyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Stars: ✭ 30 (-93.93%)
conclaveQuery compiler for secure multi-party computation.
Stars: ✭ 86 (-82.59%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (-67.61%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (-68.83%)
assisted-log-enabler-for-awsAssisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.
Stars: ✭ 167 (-66.19%)
SharpAn anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the network.
Stars: ✭ 150 (-69.64%)
Intel-OneCommand line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (-95.34%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-93.12%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+153.64%)
Personal Security Checklist🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+383.4%)
KartonDistributed malware processing framework based on Python, Redis and MinIO.
Stars: ✭ 134 (-72.87%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (-43.12%)
Awesome-CyberSec-ResourcesAn awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (-44.74%)
OpenubaA robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by Data Scientists & Security Analysts from the Cyber Security Industry. [PRE-ALPHA]
Stars: ✭ 127 (-74.29%)
LANraragi cnThis repo is a fork of Difegue / LANraragi , those things i've done was to translate this repo into chinese ,and fix chrome browser js problem.
Stars: ✭ 147 (-70.24%)
PhishingkittrackerLet's track phishing kits to give to research community raw material to study !
Stars: ✭ 126 (-74.49%)
GnuradioGNU Radio – the Free and Open Software Radio Ecosystem
Stars: ✭ 3,297 (+567.41%)
Walkoff AppsWALKOFF-enabled applications. #nsacyber
Stars: ✭ 125 (-74.7%)
Blue-BaronAutomate creating resilient, disposable, secure and agile monitoring infrastructure for Blue Teams.
Stars: ✭ 23 (-95.34%)
Mwdb CoreMalware repository component for samples & static configuration with REST API interface.
Stars: ✭ 125 (-74.7%)
OblivionData leak checker & OSINT Tool
Stars: ✭ 237 (-52.02%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (-75.1%)
SWELFSimple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Stars: ✭ 23 (-95.34%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+294.53%)
CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+532.79%)
LabtainersLabtainers: A Docker-based cyber lab framework
Stars: ✭ 226 (-54.25%)
Hack ToolsThe all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+456.68%)
GitmonitorOne way to continuously monitor sensitive information that could be exposed on Github
Stars: ✭ 115 (-76.72%)
AutottpAutomated Tactics Techniques & Procedures
Stars: ✭ 215 (-56.48%)
Cyberdisc BotThe bot for the Cyber Discovery Community Discord Server!
Stars: ✭ 108 (-78.14%)
HostintelA modular Python application to collect intelligence for malicious hosts.
Stars: ✭ 211 (-57.29%)
XsscopeXSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.
Stars: ✭ 103 (-79.15%)
BluecommandDashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard
Stars: ✭ 99 (-79.96%)
RichelieuList of the most common French passwords
Stars: ✭ 199 (-59.72%)
FileintelA modular Python application to pull intelligence about malicious files
Stars: ✭ 97 (-80.36%)
Pro-GNNImplementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
Stars: ✭ 202 (-59.11%)
LockphishLockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (-62.35%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-82.19%)
ehtkEthical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (-88.06%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-81.98%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (-61.34%)
RvdRobot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-82.39%)
byte-of-python《简明 Python 教程》V4.0c 2017 译本 /A Byte of Python 2017 Simplified Chinese Translation Edition
Stars: ✭ 604 (+22.27%)
JwtcatA CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
Stars: ✭ 181 (-63.36%)
Whoishere.pyWIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.
Stars: ✭ 182 (-63.16%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-90.89%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-87.65%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-96.36%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (-40.08%)