All Projects → security-guidance → Similar Projects or Alternatives

361 Open source projects that are alternatives of or similar to security-guidance

phomber
Phomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (+321.43%)
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (+264.29%)
netizenship
a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (+135.71%)
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+24792.86%)
Openuba
A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by Data Scientists & Security Analysts from the Cyber Security Industry. [PRE-ALPHA]
Stars: ✭ 127 (+807.14%)
Content
Security automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+8607.14%)
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+2071.43%)
Wireshark Cheatsheet
Wireshark Cheat Sheet
Stars: ✭ 131 (+835.71%)
incident-response-plan-template
A concise, directive, specific, flexible, and free incident response plan template
Stars: ✭ 288 (+1957.14%)
Opcde
OPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (+3742.86%)
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (+1000%)
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+2928.57%)
log4j-detector
Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (+4342.86%)
Mutual labels:  cybersecurity
trj
Execute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Stars: ✭ 21 (+50%)
Mutual labels:  cybersecurity
HostEnumerator
A tool that automates the process of enumeration
Stars: ✭ 29 (+107.14%)
Mutual labels:  cybersecurity
GRFICSv2
Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
Stars: ✭ 119 (+750%)
Mutual labels:  cybersecurity
pyiocutils
A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).
Stars: ✭ 18 (+28.57%)
Mutual labels:  cybersecurity
cyberops
Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (+28.57%)
Mutual labels:  cybersecurity
PoW-Shield
Project dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (+607.14%)
Mutual labels:  cybersecurity
echoCTF.RED
A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase
Stars: ✭ 33 (+135.71%)
Mutual labels:  cybersecurity
CVE-2021-44228-PoC-log4j-bypass-words
🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+5328.57%)
Mutual labels:  cybersecurity
attack-stix-data
STIX data representing MITRE ATT&CK
Stars: ✭ 118 (+742.86%)
Mutual labels:  cybersecurity
GDPatrol
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (+257.14%)
Mutual labels:  cybersecurity
Malware-Machine-Learning
Malware Machine Learning
Stars: ✭ 26 (+85.71%)
Mutual labels:  cybersecurity
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+507.14%)
Mutual labels:  cybersecurity
DARK-FB v1.6
script hack fb
Stars: ✭ 50 (+257.14%)
Mutual labels:  cybersecurity
SCANNER-INURLBR
Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (+542.86%)
Mutual labels:  cybersecurity
SentryPeer
A distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (+671.43%)
Mutual labels:  cybersecurity
connectors
OpenCTI connectors
Stars: ✭ 135 (+864.29%)
Mutual labels:  cybersecurity
firecracker
Stop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+3028.57%)
Mutual labels:  cybersecurity
Cyber-Security
This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (+200%)
Mutual labels:  cybersecurity
sike-java
SIKE for Java is a software library that implements experimental supersingular isogeny cryptographic schemes that aim to provide protection against attackers running a large-scale quantum computer.
Stars: ✭ 28 (+100%)
Mutual labels:  cybersecurity
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (+57.14%)
Mutual labels:  cybersecurity
dorothy
Dorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (+507.14%)
Mutual labels:  cybersecurity
gsvsoc cirt-playbook-battle-cards
Cyber Incident Response Team Playbook Battle Cards
Stars: ✭ 142 (+914.29%)
Mutual labels:  cybersecurity
awesome-cloud-security
🛡️ Awesome Cloud Security Resources ⚔️
Stars: ✭ 1,056 (+7442.86%)
Mutual labels:  cybersecurity
anubis
Captive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (+228.57%)
Mutual labels:  information-security
vagrant-ids
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (+50%)
Mutual labels:  information-security
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+521.43%)
Mutual labels:  cybersecurity
aurora
Malware similarity platform with modularity in mind.
Stars: ✭ 70 (+400%)
Mutual labels:  cybersecurity
RedBook
基于Threathunting-book基础上完善的狩猎视角红队handbook
Stars: ✭ 56 (+300%)
Mutual labels:  cybersecurity
CTF-Write-UP
澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (+92.86%)
Mutual labels:  cybersecurity
hackipy
Hacking, pen-testing, and cyber-security related tools built with Python.
Stars: ✭ 26 (+85.71%)
Mutual labels:  cybersecurity
chrome extension
Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.
Stars: ✭ 53 (+278.57%)
Mutual labels:  information-security
BTPS-SecPack
This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding a…
Stars: ✭ 33 (+135.71%)
Mutual labels:  cybersecurity
attckr
⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (+57.14%)
Mutual labels:  cybersecurity
EventTranscriptParser
Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (+57.14%)
Mutual labels:  cybersecurity
csn09112
CSN09112 Module
Stars: ✭ 15 (+7.14%)
Mutual labels:  cybersecurity
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+51571.43%)
Mutual labels:  cybersecurity
cycat-service
CyCAT.org API back-end server including crawlers
Stars: ✭ 25 (+78.57%)
Mutual labels:  cybersecurity
URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+621.43%)
Mutual labels:  cybersecurity
humble
A humble, and fast, security-oriented HTTP headers analyzer
Stars: ✭ 17 (+21.43%)
Mutual labels:  cybersecurity
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+400%)
Mutual labels:  cybersecurity
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (+885.71%)
Mutual labels:  cybersecurity
recce
Domain availbility checker
Stars: ✭ 30 (+114.29%)
Mutual labels:  information-security
mitrecnd.github.io
MITRE Shield website
Stars: ✭ 17 (+21.43%)
Mutual labels:  cybersecurity
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+221.43%)
Mutual labels:  cybersecurity
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (+400%)
Mutual labels:  cybersecurity
digital-copyright
Stamp your code with a trackable digital copyright
Stars: ✭ 17 (+21.43%)
Mutual labels:  cybersecurity
attack-evals
ATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+307.14%)
Mutual labels:  cybersecurity
1-60 of 361 similar projects