orbA DID method implementation that extends the Sidetree protocol into a Fediverse of interconnected nodes and witnessed using certificate transparency. Spec: https://trustbloc.github.io/did-method-orb/
Stars: ✭ 25 (-98.41%)
cyberdicAn auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide
Stars: ✭ 63 (-96.01%)
gravity-sphincsSignature scheme submitted to NIST's Post-Quantum Cryptography Project
Stars: ✭ 67 (-95.75%)
CyberQueensCyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Stars: ✭ 30 (-98.1%)
CertspotterCertificate Transparency Log Monitor
Stars: ✭ 497 (-68.48%)
super-dollopEncrypt your files or notes by your GPG key and save to MinIO or AWS S3 easily!
Stars: ✭ 58 (-96.32%)
fluent-bit-go-s3[Deprecated] The predessor of fluent-bit output plugin for Amazon S3. https://aws.amazon.com/s3/
Stars: ✭ 34 (-97.84%)
WebDAVServerSamplesJavaWebDAV server examples in Java based on IT Hit WebDAV Server Library for Java
Stars: ✭ 38 (-97.59%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-96.13%)
ipaddressData analysis of IP addresses and networks
Stars: ✭ 20 (-98.73%)
MinioHigh Performance, Kubernetes Native Object Storage
Stars: ✭ 30,698 (+1846.61%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-81.8%)
foundationfor the Great Civilization
Stars: ✭ 54 (-96.58%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (-90.3%)
PkiThe Dogtag Certificate System is an enterprise-class Certificate Authority (CA) which supports all aspects of certificate lifecycle management, including key archival, OCSP and smartcard management.
Stars: ✭ 97 (-93.85%)
ct-honeybeeLightweight program that pollinates STHs between Certificate Transparency logs and auditors
Stars: ✭ 25 (-98.41%)
data-transfer-hubSeamless User Interface for replicating data into AWS.
Stars: ✭ 102 (-93.53%)
XipkiHighly scalable and high-performance open source PKI (CA and OCSP responder). Minimal dependencies, No-JPA, No-Spring
Stars: ✭ 311 (-80.28%)
TrillianA transparent, highly scalable and cryptographically verifiable data store.
Stars: ✭ 2,819 (+78.76%)
artefactory-connectors-kitACK is an E(T)L tool specialized in API data ingestion. It is accessible through a Command-Line Interface. The application allows you to easily extract, stream and load data (with minimum transformations), from the API source to the destination of your choice.
Stars: ✭ 34 (-97.84%)
CTjsCTjs is a full set of classes necessary to work with any kind of Certificate Transparency log (V1 as from RFC6962, or V2 as from RFC6962-bis). In CTjs you could find all necessary validation/verification functions for all related data shipped with full-featured examples showning how to validate/verify. Also in scope of CTjs I made code showing e…
Stars: ✭ 2 (-99.87%)
Nginx CtCertificate Transparency module for nginx.
Stars: ✭ 171 (-89.16%)
cloud-experimentsOpen innovation with 60 minute cloud experiments on AWS
Stars: ✭ 72 (-95.43%)
polynimbusMulti-cloud infrastructure inventory and management tool, supporting AWS, Google Cloud, Azure, Oracle Cloud, Rackspace Cloud, Hetzner Cloud, Alibaba Cloud, e24cloud.com, Linode, Cloudflare, GoDaddy and Backblaze B2.
Stars: ✭ 70 (-95.56%)
SublertSublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (-55.68%)
ct-woodpeckerA tool to monitor a certificate transparency log for operational problems
Stars: ✭ 136 (-91.38%)
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-97.59%)
prune-horstSignature scheme submitted to NIST's Post-Quantum Cryptography Project
Stars: ✭ 23 (-98.54%)
CertstreammonitorMonitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come online.
Stars: ✭ 111 (-92.96%)
Standalone-Windows-Server-STIG-ScriptSTIG Standalone Windows Servers to DoD STIG/SRG Requirements and NSACyber Guidance. The ultimate Windows Server security and compliance script!
Stars: ✭ 26 (-98.35%)
CTF-Write-UP澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (-98.29%)
sandcastle🏰 A Python script for AWS S3 bucket enumeration.
Stars: ✭ 53 (-96.64%)
Bugcrowd Levelup Subdomain EnumerationThis repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtual conference
Stars: ✭ 513 (-67.47%)
ThreatPursuit-VMThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 1,033 (-34.5%)
Windows-Optimize-Harden-DebloatFully Optimize, Harden, and Debloat Windows 10 and Windows 11 Deployments to Windows Best Practices and DoD STIG/SRG Requirements. The ultimate Windows 10 & 11 security and privacy script!
Stars: ✭ 304 (-80.72%)
dev-cyberNot the device we need, but the one we deserve
Stars: ✭ 19 (-98.8%)
dig-into-apolloApollo notes (Apollo学习笔记) - Apollo learning notes for beginners.
Stars: ✭ 1,786 (+13.25%)
CyberPunkNetrunnerCyberpunk 2077 Netrunner Hacking Tool (Easy to use and install). Don't use it on illegal and malicious activity. Inspired by the game CyberPunk 2077 https://www.cyberpunk.net/
Stars: ✭ 69 (-95.62%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+265.44%)
CheckSSL🔒Check your site's SSL status using curl & bash
Stars: ✭ 41 (-97.4%)
securitytoolsquality community projects 👨👩👧👦📓🔎
Stars: ✭ 26 (-98.35%)
backup-repositoryBackup storage for E2E GPG-encrypted files, with multi-user, quotas, versioning, using a object storage (S3/Min.io/GCS etc.) and deployed on Kubernetes or standalone.
Stars: ✭ 21 (-98.67%)
tlsassistantFully-featured tool that combines state-of-the-art TLS analyzers with a report system that suggests appropriate mitigations and shows the full set of viable attacks.
Stars: ✭ 24 (-98.48%)
ct-submitA program for submitting X.509 certificate chains to Certificate Transparency log servers.
Stars: ✭ 77 (-95.12%)
OsweepDon't Just Search OSINT. Sweep It.
Stars: ✭ 225 (-85.73%)
ShhgitAh shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories: www.shhgit.com
Stars: ✭ 3,316 (+110.27%)
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (-72.23%)
CtfrAbusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (-2.66%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (-48.38%)
StreamingphishPython-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.
Stars: ✭ 271 (-82.82%)
SubcertSubcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (-96.32%)