PatrowldocsPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (+133.33%)
WsltoolsWeb Scan Lazy Tools - Python Package
Stars: ✭ 288 (+540%)
TurbiniaAutomation and Scaling of Digital Forensics Tools
Stars: ✭ 461 (+924.44%)
BurpaBurp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Application Security Testing (DAST).
Stars: ✭ 427 (+848.89%)
NosqliNoSql Injection CLI tool, for finding vulnerable websites using MongoDB.
Stars: ✭ 120 (+166.67%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+19553.33%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+706.67%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-20%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (+697.78%)
InsiderStatic Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on a agile and easy to implement software inside your DevOps pipeline. Support the following technologies: Java (Maven and Android), Kotlin (Android), Swift (iOS), .NET Full Framework, C#, and Javascript (Node.js).
Stars: ✭ 216 (+380%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-53.33%)
PatrowlenginesPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (+260%)
Intrusion DetectionWhenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.
Stars: ✭ 24 (-46.67%)
xssmapIntelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Stars: ✭ 107 (+137.78%)
docker-wallarm-node⚡️ Docker official image for Wallarm Node. API security platform agent.
Stars: ✭ 18 (-60%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (+0%)
SuperSecure, Unified, Powerful and Extensible Rust Android Analyzer
Stars: ✭ 340 (+655.56%)
NetworkAlarmA tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, credentials sent in-the-clear, and shellshock attacks. Currently supports live monitoring and network capture (pcap) scanning.
Stars: ✭ 17 (-62.22%)
secure-pipeline-advisorImprove your code security by running different security checks/validation in a simple way.
Stars: ✭ 25 (-44.44%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (+1048.89%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-71.11%)
Tr1pdtamper resistant audit log
Stars: ✭ 13 (-71.11%)
DFIR Resources REvil KaseyaResources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
Stars: ✭ 172 (+282.22%)
flare-wmiNo description or website provided.
Stars: ✭ 399 (+786.67%)
PackratLive system forensic collector
Stars: ✭ 16 (-64.44%)
qedThe scalable, auditable and high-performance tamper-evident log project
Stars: ✭ 87 (+93.33%)
LID-DSLID-DS is an intrusion detection data simulation framework.
Stars: ✭ 32 (-28.89%)
GetConsoleHistoryAndOutputAn Incident Response tool to extract console command history and screen output buffer
Stars: ✭ 41 (-8.89%)
RapidRepoPullThe goal of this program is to quickly pull and install repos from its list
Stars: ✭ 40 (-11.11%)
ninjaberryNinjaberry: Raspberry Pi UI for @bettercap
Stars: ✭ 39 (-13.33%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (+0%)
harvestTool to sort large collections of files according to common typologies
Stars: ✭ 32 (-28.89%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-31.11%)
demuxusbA program and toolset to analyze iDevice USB sessions
Stars: ✭ 25 (-44.44%)
pythxA Python library for the MythX smart contract security analysis platform
Stars: ✭ 30 (-33.33%)
UBUNTU20-CISAnsible role for Ubuntu 2004 CIS Baseline
Stars: ✭ 136 (+202.22%)
prowlerProwler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+17780%)
dirbpyThis is the new version of dirb in python
Stars: ✭ 36 (-20%)
JxnetJxnet is a Java library for capturing and sending custom network packet buffers with no copies. Jxnet wraps a native packet capture library (libpcap/winpcap/npcap) via JNI (Java Native Interface).
Stars: ✭ 26 (-42.22%)
AdtimelineTimeline of Active Directory changes with replication metadata
Stars: ✭ 252 (+460%)
Invtero.netinVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
Stars: ✭ 237 (+426.67%)
VulnogramVulnogram is a tool for creating and editing CVE information in CVE JSON format
Stars: ✭ 103 (+128.89%)
Radare2UNIX-like reverse engineering framework and command-line toolset
Stars: ✭ 15,412 (+34148.89%)
RemoteNETExamine, create and interact with remote objects in other .NET processes.
Stars: ✭ 29 (-35.56%)
MEATThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✭ 101 (+124.44%)
kali-my-linuxInstall Kali Linux Tools & Others on your Linux.
Stars: ✭ 37 (-17.78%)
LogESPOpen Source SIEM (Security Information and Event Management system).
Stars: ✭ 162 (+260%)
UserlineQuery and report user logons relations from MS Windows Security Events
Stars: ✭ 221 (+391.11%)
Forensic ToolsA collection of tools for forensic analysis
Stars: ✭ 204 (+353.33%)
default-http-login-hunterLogin hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+533.33%)
FatcatFAT filesystems explore, extract, repair, and forensic tool
Stars: ✭ 201 (+346.67%)
WhatsdumpExtract WhatsApp private key from any non-rooted Android device (Android 7+ supported)
Stars: ✭ 198 (+340%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+291.11%)
burp-aem-scannerBurp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common misconfigurations and security holes.
Stars: ✭ 60 (+33.33%)
PypowershellxrayPython script to decode common encoded PowerShell scripts
Stars: ✭ 192 (+326.67%)