SysmonResourcesConsolidation of various resources related to Microsoft Sysmon & sample data/log
Stars: ✭ 64 (-28.09%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+215.73%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+659.55%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-75.28%)
SSHapendoesCapture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-65.17%)
PocOrExp in Github聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
Stars: ✭ 544 (+511.24%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-3.37%)
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-82.02%)
scan-cli-pluginDocker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images
Stars: ✭ 135 (+51.69%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+42.7%)
cwe-sdk-javascriptA Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC
Stars: ✭ 18 (-79.78%)
pyetiPython bindings for Yeti's API
Stars: ✭ 15 (-83.15%)
vulnerablecodeA free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode Docs at https://vulnerablecode.readthedocs.org/
Stars: ✭ 269 (+202.25%)
PymispPython library using the MISP Rest API
Stars: ✭ 254 (+185.39%)
ScrummageThe Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (+298.88%)
CVE-StockpileMaster list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.
Stars: ✭ 41 (-53.93%)
DnstwistDomain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+3410.11%)
connectorsOpenCTI connectors
Stars: ✭ 135 (+51.69%)
GDPatrolA Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (-43.82%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (+2.25%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-21.35%)
Sysmon ConfigSysmon configuration file template with default high-quality event tracing
Stars: ✭ 3,287 (+3593.26%)
Vulapps快速搭建各种漏洞环境(Various vulnerability environment)
Stars: ✭ 3,353 (+3667.42%)
ApiVulners Python API wrapper
Stars: ✭ 313 (+251.69%)
WebmapWebMap-Nmap Web Dashboard and Reporting
Stars: ✭ 357 (+301.12%)
BootstompBootStomp: a bootloader vulnerability finder
Stars: ✭ 303 (+240.45%)
Python IocextractDefanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (+237.08%)
PocAdvisories, proof of concept files and exploits that have been made public by @pedrib.
Stars: ✭ 376 (+322.47%)
SecuritymanageframworkSecurity Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (+324.72%)
OpencveCVE Alerting Platform
Stars: ✭ 384 (+331.46%)
MeerkatA collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Stars: ✭ 284 (+219.1%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+364.04%)
ShuffleShuffle: A general purpose security automation platform platform. We focus on accessibility for all.
Stars: ✭ 424 (+376.4%)
KlaraKaspersky's GReAT KLara
Stars: ✭ 565 (+534.83%)
FuzzapiFuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem
Stars: ✭ 521 (+485.39%)
Kernelpopkernel privilege escalation enumeration and exploitation framework
Stars: ✭ 628 (+605.62%)
DawnscannerDawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
Stars: ✭ 642 (+621.35%)
Dependency TrackDependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Stars: ✭ 718 (+706.74%)
HarpoonCLI tool for open source and threat intelligence
Stars: ✭ 679 (+662.92%)
Just Api💥 Test REST, GraphQL APIs
Stars: ✭ 768 (+762.92%)
Xunfeng巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+3417.98%)
ZerocodeA community-developed, free, open source, microservices API automation and load testing framework built using JUnit core runners for Http REST, SOAP, Security, Database, Kafka and much more. Zerocode Open Source enables you to create, change, orchestrate and maintain your automated test cases declaratively with absolute ease.
Stars: ✭ 482 (+441.57%)
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+659.55%)
Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+770.79%)
GocertcenterCertCenter API Go Implementation
Stars: ✭ 21 (-76.4%)
Signature BaseSignature base for my scanner tools
Stars: ✭ 1,212 (+1261.8%)
Nexrender📹 Data-driven render automation for After Effects
Stars: ✭ 946 (+962.92%)
SootyThe SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (+874.16%)
Quip ExportExport all folders and documents from Quip
Stars: ✭ 28 (-68.54%)
Cve ApiUnofficial api for cve.mitre.org
Stars: ✭ 36 (-59.55%)
Kernelhub🌴Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file
Stars: ✭ 972 (+992.13%)
YetiYour Everyday Threat Intelligence
Stars: ✭ 1,037 (+1065.17%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+1105.62%)