Libellux-Up-and-RunningLibellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-93.73%)
cyberopsCisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (-94.06%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-69.97%)
tariqHybrid Port Knocking System
Stars: ✭ 20 (-93.4%)
gonidsgonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (-53.8%)
kdd99-scikitSolutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
Stars: ✭ 50 (-83.5%)
CyberscanCyberScan: Network's Forensics ToolKit
Stars: ✭ 280 (-7.59%)
auroraMalware similarity platform with modularity in mind.
Stars: ✭ 70 (-76.9%)
penetration testing🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-81.19%)
hackipyHacking, pen-testing, and cyber-security related tools built with Python.
Stars: ✭ 26 (-91.42%)
FakeUSBMake your own BadUSB device!
Stars: ✭ 14 (-95.38%)
aflnwAFLNW: network wrapper for AFL
Stars: ✭ 21 (-93.07%)
idsaThis is the main repository of International Data Spaces Association on GitHub, where you can find general overview and required information on IDS Open Source Landscape.
Stars: ✭ 22 (-92.74%)
ChepyChepy is a python lib/cli equivalent of the awesome CyberChef tool.
Stars: ✭ 295 (-2.64%)
TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-93.07%)
wifi-deautherA fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-91.75%)
security-guidanceSecurity guidance from the MOJ Digital & Technology Cybersecurity team
Stars: ✭ 14 (-95.38%)
SentryPeerA distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (-64.36%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-10.23%)
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+44.55%)
rstthreatsAggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-94.39%)
sike-javaSIKE for Java is a software library that implements experimental supersingular isogeny cryptographic schemes that aim to provide protection against attackers running a large-scale quantum computer.
Stars: ✭ 28 (-90.76%)
bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (-89.77%)
goblin一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+178.55%)
Psadpsad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (-1.65%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-71.29%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-92.74%)
RedBook基于Threathunting-book基础上完善的狩猎视角红队handbook
Stars: ✭ 56 (-81.52%)
AwesomeMoroccanHackersAn Awesome List of Moroccan Cyber Security Researchers, Pentesters, Bug Hunters.
Stars: ✭ 69 (-77.23%)
SCANNER-INURLBRAdvanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (-70.3%)
ExposeAn Intrusion Detection System library loosely based on PHP IDS
Stars: ✭ 255 (-15.84%)
EventTranscriptParserPython based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-92.74%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (-86.14%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+2287.46%)
humbleA humble, and fast, security-oriented HTTP headers analyzer
Stars: ✭ 17 (-94.39%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-93.07%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-85.15%)
SubzySubdomain takeover vulnerability checker
Stars: ✭ 287 (-5.28%)
digital-copyrightStamp your code with a trackable digital copyright
Stars: ✭ 17 (-94.39%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-92.74%)
testmynids.orgA website and framework for testing NIDS detection
Stars: ✭ 55 (-81.85%)
what-vpnIdentify servers running various SSL VPNs based on protocol-specific behaviors
Stars: ✭ 24 (-92.08%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-5.28%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-85.15%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-86.14%)
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-94.72%)
adv-dnn-ens-malwareadversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (-89.11%)
CTF-WriteupsRepository of my CTF writeups
Stars: ✭ 25 (-91.75%)
Kali-Linux-Tools-InterfaceGraphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (-44.22%)
connectorsOpenCTI connectors
Stars: ✭ 135 (-55.45%)
pdns-qofPassive DNS Common Output Format
Stars: ✭ 30 (-90.1%)
CcatCloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (-0.99%)
Adversary emulation libraryAn open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (-2.64%)