CC33ZCurso de Ciência da Computação
Stars: ✭ 50 (+257.14%)
connectorsOpenCTI connectors
Stars: ✭ 135 (+864.29%)
ArmorLibEasily scan files for threats to security and privacy. A Rust library and command line tool. WIP.
Stars: ✭ 20 (+42.86%)
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+3028.57%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (+200%)
sike-javaSIKE for Java is a software library that implements experimental supersingular isogeny cryptographic schemes that aim to provide protection against attackers running a large-scale quantum computer.
Stars: ✭ 28 (+100%)
Practical Malware AnalysisMaterials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✭ 16 (+14.29%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (+57.14%)
know your ipKnow Your IP: Get location, blacklist status, shodan and censys results, and more.
Stars: ✭ 16 (+14.29%)
pyiocutilsA collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).
Stars: ✭ 18 (+28.57%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (+507.14%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (+28.57%)
TheRoadOfSO学习安全运营的记录 | The knowledge base of security operation
Stars: ✭ 286 (+1942.86%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+464.29%)
anubisCaptive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (+228.57%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (+328.57%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (+50%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+521.43%)
auroraMalware similarity platform with modularity in mind.
Stars: ✭ 70 (+400%)
digital-copyrightStamp your code with a trackable digital copyright
Stars: ✭ 17 (+21.43%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+328.57%)
RedBook基于Threathunting-book基础上完善的狩猎视角红队handbook
Stars: ✭ 56 (+300%)
LAZYPARIAHA tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+764.29%)
CTF-Write-UP澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (+92.86%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+4728.57%)
chrome extensionBrowser extension that uses intelligence to combat malicious websites by blocking them in real-time.
Stars: ✭ 53 (+278.57%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (+121.43%)
hackipyHacking, pen-testing, and cyber-security related tools built with Python.
Stars: ✭ 26 (+85.71%)
EventTranscriptParserPython based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (+57.14%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (+57.14%)
ioc-scannerSearch a filesystem for indicators of compromise (IoC).
Stars: ✭ 31 (+121.43%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+51571.43%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (+78.57%)
SWELFSimple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Stars: ✭ 23 (+64.29%)
humbleA humble, and fast, security-oriented HTTP headers analyzer
Stars: ✭ 17 (+21.43%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (+142.86%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+400%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+221.43%)
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+307.14%)
cytroneCyTrONE: Integrated Cybersecurity Training Framework
Stars: ✭ 72 (+414.29%)
gosintGosint is a distributed asset information collection and vulnerability scanning platform
Stars: ✭ 344 (+2357.14%)
Behold3r👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
Stars: ✭ 29 (+107.14%)
Malicious-Urlv5A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (+150%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (+35.71%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+2014.29%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+500%)