argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+200%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (+44.83%)
ICS-Protocal-Detect-Nmap-ScriptSome nmap scripts to detetct the infomations of the different ICS Here are 16 main ics protocal scan-scripts include Modbus, S7 and so on.
Stars: ✭ 21 (-27.59%)
auroraMalware similarity platform with modularity in mind.
Stars: ✭ 70 (+141.38%)
Delphi SChannelTLSHelper functions and socket classes to perform TLS communication by means of WinAPI (SChannel)
Stars: ✭ 22 (-24.14%)
TcUnit-RunnerProgram that makes it possible to automate runs of TcUnit unit tests
Stars: ✭ 23 (-20.69%)
BTPS-SecPackThis repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding a…
Stars: ✭ 33 (+13.79%)
wtphmSCADA data pre-processing library for prognostics, health management and fault detection of wind turbines. Successor to https://github.com/lkev/wt-fdd
Stars: ✭ 38 (+31.03%)
EventTranscriptParserPython based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-24.14%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+193.1%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+24844.83%)
humbleA humble, and fast, security-oriented HTTP headers analyzer
Stars: ✭ 17 (-41.38%)
security-guidanceSecurity guidance from the MOJ Digital & Technology Cybersecurity team
Stars: ✭ 14 (-51.72%)
digital-copyrightStamp your code with a trackable digital copyright
Stars: ✭ 17 (-41.38%)
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+96.55%)
SoftBeckhoffVirtual Beckhoff PLC for local testing with docker support
Stars: ✭ 40 (+37.93%)
ical2jsonA simple node package to convert ical data to json
Stars: ✭ 46 (+58.62%)
freeioeFreeIOE is a framework for building IOE (Internet Of Everything) edge-computing gateway 开源的边缘计算网关框架. 讨论群: 291292378
Stars: ✭ 77 (+165.52%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+889.66%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-13.79%)
s7clientHi level API for node-snap7 to communication with Siemens S7 PLCs
Stars: ✭ 36 (+24.14%)
moka7-liveS7 PLC communication library for Java, based on Moka7
Stars: ✭ 28 (-3.45%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+189.66%)
adv-dnn-ens-malwareadversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (+13.79%)
weather-calendar-feedDisplay yr.no weather (supports the entire Earth) forecasts with highly customizable Event titles in your Google Calendar, Android phone, iPhone, Outlook or other iCalendar app
Stars: ✭ 16 (-44.83%)
TF6100 SamplesContains product samples for TF6100 TC3 OPC UA
Stars: ✭ 15 (-48.28%)
recommendations-for-engineersAll of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 81 (+179.31%)
connectorsOpenCTI connectors
Stars: ✭ 135 (+365.52%)
SentryPeerA distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (+272.41%)
ml-aiML-AI Community | Open Source | Built in Bharat for the World | Data science problem statements and solutions
Stars: ✭ 32 (+10.34%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+1362.07%)
log4j-detectorLog4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (+2044.83%)
Practical Malware AnalysisMaterials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✭ 16 (-44.83%)
QSimpleScadaQt based simple SCADA framework, with dashboard, static and dynamic components
Stars: ✭ 152 (+424.14%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+427.59%)
know your ipKnow Your IP: Get location, blacklist status, shodan and censys results, and more.
Stars: ✭ 16 (-44.83%)
linkedin-employee-scraperExtract all employees from LinkedIn. Especially useful for companies with thousands of employees.
Stars: ✭ 16 (-44.83%)
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+1410.34%)
node-driversIndustrial protocol drivers in node.js
Stars: ✭ 20 (-31.03%)
CTF-Write-UP澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (-6.9%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+141.38%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-24.14%)
ics2gcalImport .ics files into Google Calendar with only two clicks.
Stars: ✭ 21 (-27.59%)
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+941.38%)
calcardbackupcalcardbackup: moved to https://codeberg.org/BernieO/calcardbackup
Stars: ✭ 67 (+131.03%)
HostEnumeratorA tool that automates the process of enumeration
Stars: ✭ 29 (+0%)
TheRoadOfSO学习安全运营的记录 | The knowledge base of security operation
Stars: ✭ 286 (+886.21%)
DEVGUIDECalConnect project to provide documentation on Calendaring and related issues.
Stars: ✭ 17 (-41.38%)
prodcal icsПроизводственный календарь в формате ics
Stars: ✭ 23 (-20.69%)
sike-javaSIKE for Java is a software library that implements experimental supersingular isogeny cryptographic schemes that aim to provide protection against attackers running a large-scale quantum computer.
Stars: ✭ 28 (-3.45%)