All Projects → security-guidance → Similar Projects or Alternatives

361 Open source projects that are alternatives of or similar to security-guidance

CC33Z
Curso de Ciência da Computação
Stars: ✭ 50 (+257.14%)
Mutual labels:  information-security
connectors
OpenCTI connectors
Stars: ✭ 135 (+864.29%)
Mutual labels:  cybersecurity
ArmorLib
Easily scan files for threats to security and privacy. A Rust library and command line tool. WIP.
Stars: ✭ 20 (+42.86%)
Mutual labels:  cybersecurity
firecracker
Stop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+3028.57%)
Mutual labels:  cybersecurity
tex-course-index-template
A template for writing a condensed course index leveraging LaTeX indexing
Stars: ✭ 30 (+114.29%)
Mutual labels:  cybersecurity
Cyber-Security
This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (+200%)
Mutual labels:  cybersecurity
sike-java
SIKE for Java is a software library that implements experimental supersingular isogeny cryptographic schemes that aim to provide protection against attackers running a large-scale quantum computer.
Stars: ✭ 28 (+100%)
Mutual labels:  cybersecurity
Practical Malware Analysis
Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✭ 16 (+14.29%)
Mutual labels:  cybersecurity
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (+57.14%)
Mutual labels:  cybersecurity
know your ip
Know Your IP: Get location, blacklist status, shodan and censys results, and more.
Stars: ✭ 16 (+14.29%)
Mutual labels:  cybersecurity
pyiocutils
A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).
Stars: ✭ 18 (+28.57%)
Mutual labels:  cybersecurity
dorothy
Dorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (+507.14%)
Mutual labels:  cybersecurity
Malware-Zoo
Hashes of infamous malware
Stars: ✭ 18 (+28.57%)
Mutual labels:  cybersecurity
TheRoadOfSO
学习安全运营的记录 | The knowledge base of security operation
Stars: ✭ 286 (+1942.86%)
Mutual labels:  cybersecurity
gsvsoc cirt-playbook-battle-cards
Cyber Incident Response Team Playbook Battle Cards
Stars: ✭ 142 (+914.29%)
Mutual labels:  cybersecurity
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (+107.14%)
Mutual labels:  cybersecurity
awesome-cloud-security
🛡️ Awesome Cloud Security Resources ⚔️
Stars: ✭ 1,056 (+7442.86%)
Mutual labels:  cybersecurity
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+464.29%)
Mutual labels:  cybersecurity
anubis
Captive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (+228.57%)
Mutual labels:  information-security
SuperLibrary
Information Security Library
Stars: ✭ 60 (+328.57%)
Mutual labels:  cybersecurity
vagrant-ids
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (+50%)
Mutual labels:  information-security
SecurityInterviewGuide
网络信息安全从业者面试指南
Stars: ✭ 791 (+5550%)
Mutual labels:  cybersecurity
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+521.43%)
Mutual labels:  cybersecurity
who and what to follow
Who and what to follow in the world of cyber security
Stars: ✭ 124 (+785.71%)
Mutual labels:  cybersecurity
aurora
Malware similarity platform with modularity in mind.
Stars: ✭ 70 (+400%)
Mutual labels:  cybersecurity
digital-copyright
Stamp your code with a trackable digital copyright
Stars: ✭ 17 (+21.43%)
Mutual labels:  cybersecurity
github-watchman
Monitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+328.57%)
Mutual labels:  cybersecurity
RedBook
基于Threathunting-book基础上完善的狩猎视角红队handbook
Stars: ✭ 56 (+300%)
Mutual labels:  cybersecurity
LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+764.29%)
Mutual labels:  cybersecurity
CTF-Write-UP
澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (+92.86%)
Mutual labels:  cybersecurity
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+4728.57%)
Mutual labels:  cybersecurity
chrome extension
Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.
Stars: ✭ 53 (+278.57%)
Mutual labels:  information-security
urlRecon
📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (+121.43%)
Mutual labels:  cybersecurity
hackipy
Hacking, pen-testing, and cyber-security related tools built with Python.
Stars: ✭ 26 (+85.71%)
Mutual labels:  cybersecurity
awesome-executable-packing
A curated list of awesome resources related to executable packing
Stars: ✭ 720 (+5042.86%)
Mutual labels:  cybersecurity
EventTranscriptParser
Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (+57.14%)
Mutual labels:  cybersecurity
attckr
⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (+57.14%)
Mutual labels:  cybersecurity
ioc-scanner
Search a filesystem for indicators of compromise (IoC).
Stars: ✭ 31 (+121.43%)
Mutual labels:  cybersecurity
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+51571.43%)
Mutual labels:  cybersecurity
awesome-cybersecurity-blueteam-cn
网络安全 · 攻防对抗 · 蓝队清单,中文版
Stars: ✭ 494 (+3428.57%)
Mutual labels:  cybersecurity
cycat-service
CyCAT.org API back-end server including crawlers
Stars: ✭ 25 (+78.57%)
Mutual labels:  cybersecurity
SWELF
Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Stars: ✭ 23 (+64.29%)
Mutual labels:  cybersecurity
humble
A humble, and fast, security-oriented HTTP headers analyzer
Stars: ✭ 17 (+21.43%)
Mutual labels:  cybersecurity
OSINTBookmarks
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (+142.86%)
Mutual labels:  cybersecurity
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+400%)
Mutual labels:  cybersecurity
Information Security Handbook
No description or website provided.
Stars: ✭ 22 (+57.14%)
Mutual labels:  information-security
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+221.43%)
Mutual labels:  cybersecurity
marcellelee.github.io
No description or website provided.
Stars: ✭ 27 (+92.86%)
Mutual labels:  cybersecurity
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (+400%)
Mutual labels:  cybersecurity
attack-evals
ATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+307.14%)
Mutual labels:  cybersecurity
cytrone
CyTrONE: Integrated Cybersecurity Training Framework
Stars: ✭ 72 (+414.29%)
Mutual labels:  cybersecurity
game-of-thrones-hacking-ctf
Game of Thrones hacking CTF (Capture the flag)
Stars: ✭ 57 (+307.14%)
Mutual labels:  cybersecurity
gosint
Gosint is a distributed asset information collection and vulnerability scanning platform
Stars: ✭ 344 (+2357.14%)
Mutual labels:  information-security
Behold3r
👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
Stars: ✭ 29 (+107.14%)
Mutual labels:  cybersecurity
Threat-Hunting-and-Detection
Repository for threat hunting and detection queries, tools, etc.
Stars: ✭ 261 (+1764.29%)
Mutual labels:  cybersecurity
Malicious-Urlv5
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (+150%)
Mutual labels:  cybersecurity
FSEC-VM
Backend logic implementation for Vulnerability Management System
Stars: ✭ 19 (+35.71%)
Mutual labels:  cybersecurity
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+2014.29%)
Mutual labels:  cybersecurity
client-python
OpenCTI Python Client
Stars: ✭ 45 (+221.43%)
Mutual labels:  cybersecurity
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+500%)
Mutual labels:  cybersecurity
61-120 of 361 similar projects