MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+4740.28%)
misp-objectsDefinition, description and relationship types of MISP objects
Stars: ✭ 73 (+1.39%)
format-to-jsonAn algorithm that can format a string to json-like template. 字符串JSON格式化的算法。
Stars: ✭ 30 (-58.33%)
my-cybersecurity-notesThese are the notes i have been taking since i started learning about ethical hacking and cybersecurity
Stars: ✭ 13 (-81.94%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+290.28%)
restishRestish is a CLI for interacting with REST-ish HTTP APIs with some nice features built-in
Stars: ✭ 453 (+529.17%)
ioc-scannerSearch a filesystem for indicators of compromise (IoC).
Stars: ✭ 31 (-56.94%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-16.67%)
openshift-json-schemaA set of JSON schemas for various OpenShift versions, extracted from the OpenAPI definitions
Stars: ✭ 23 (-68.06%)
finspec-specMulti-protocol, machine-readable specifications for financial services
Stars: ✭ 18 (-75%)
DevSecOpsUltimate DevSecOps library
Stars: ✭ 4,450 (+6080.56%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-47.22%)
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+41.67%)
conclaveQuery compiler for secure multi-party computation.
Stars: ✭ 86 (+19.44%)
magnetA JSON/BSON schema generator
Stars: ✭ 16 (-77.78%)
Intel-OneCommand line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (-68.06%)
json-schemaJSON schema validation
Stars: ✭ 20 (-72.22%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-15.28%)
libgltfglTF 2.0 parser/loader for C++11, supports many extensions likes `KHR_draco_mesh_compression`, `KHR_lights_punctual`, `KHR_materials_clearcoat`, and more.
Stars: ✭ 55 (-23.61%)
MultiTypeJsonParseran util to parse json which contains multi type jsonObject
Stars: ✭ 34 (-52.78%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-52.78%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-75%)
ehtkEthical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (-18.06%)
shape-jsonModule used to convert a flat json array into a nested json object with a predefined scheme
Stars: ✭ 31 (-56.94%)
LabtainersLabtainers: A Docker-based cyber lab framework
Stars: ✭ 226 (+213.89%)
as-typedAmbient mapping from JSON schema to typescript
Stars: ✭ 97 (+34.72%)
another-json-schemaAnother JSON Schema validator, simple & flexible & intuitive.
Stars: ✭ 48 (-33.33%)
json matcherLibrary for simplifying data verification in functional tests for your JSON-based APIs
Stars: ✭ 24 (-66.67%)
cytroneCyTrONE: Integrated Cybersecurity Training Framework
Stars: ✭ 72 (+0%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-34.72%)
DomainCATDomain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
Stars: ✭ 34 (-52.78%)
SSI Extra MaterialsIn my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (-41.67%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-73.61%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+94.44%)
qvm-create-windows-qubeSpin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Stars: ✭ 267 (+270.83%)
django-jsonformA better, user-friendly JSON editing form field for Django admin. Also supports Postgres ArrayField.
Stars: ✭ 151 (+109.72%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+23.61%)
OpenAPI-DelphiThe Delphi-OpenAPI library is an OpenAPI 3.0 document generator and parser for Delphi
Stars: ✭ 79 (+9.72%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-37.5%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+311.11%)
Awesome-CyberSec-ResourcesAn awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+279.17%)
CyberQueensCyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Stars: ✭ 30 (-58.33%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-56.94%)