HyaraYara rule making tool (IDA Pro & Binary Ninja & Cutter Plugin)
Stars: ✭ 142 (-67.65%)
catalystCatalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (-79.27%)
ApplicationinspectorA source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
Stars: ✭ 3,873 (+782.23%)
CloudfruntA tool for identifying misconfigured CloudFront domains
Stars: ✭ 281 (-35.99%)
mailcatFind existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve cat's job! 🐱🔎 📬
Stars: ✭ 219 (-50.11%)
KatanaA Python Tool For google Hacking
Stars: ✭ 355 (-19.13%)
OrbitBlockchain Transactions Investigation Tool
Stars: ✭ 278 (-36.67%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (-0.91%)
ScavengerCrawler (Bot) searching for credential leaks on different paste sites.
Stars: ✭ 347 (-20.96%)
vue3-oop使用类和依赖注入写vue组件
Stars: ✭ 90 (-79.5%)
MemProcFS-AnalyzerMemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Stars: ✭ 89 (-79.73%)
detection-rulesThreat Detection & Anomaly Detection rules for popular open-source components
Stars: ✭ 34 (-92.26%)
Secretzsecretz, minimizing the large attack surface of Travis CI
Stars: ✭ 279 (-36.45%)
decrypticonJava-layer Android Malware Simplifier
Stars: ✭ 17 (-96.13%)
JoddJodd! Lightweight. Java. Zero dependencies. Use what you like.
Stars: ✭ 3,616 (+723.69%)
Stronginjectcompile time dependency injection for .NET
Stars: ✭ 277 (-36.9%)
StrelkaReal-time, container-based file scanning at enterprise scale
Stars: ✭ 387 (-11.85%)
Recon PipelineAn automated target reconnaissance pipeline.
Stars: ✭ 278 (-36.67%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-19.36%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+573.35%)
hassh-utilshassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hassh)
Stars: ✭ 41 (-90.66%)
0xsp Mongoosea unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Stars: ✭ 419 (-4.56%)
hacking-resourcesHacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+215.72%)
QuicklibQuick development library (AutoMapper, LinQ, IOC Dependency Injection, MemoryCache, Scheduled tasks, Config, Serializers, etc) with crossplatform support for Delphi/Firemonkey (Windows,Linux,OSX/IOS/Android) and freepascal (Windows/Linux).
Stars: ✭ 274 (-37.59%)
BirdwatcherData analysis and OSINT framework for Twitter
Stars: ✭ 352 (-19.82%)
Vaultswiss army knife for hackers
Stars: ✭ 346 (-21.18%)
Salt ScannerLinux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
Stars: ✭ 261 (-40.55%)
smram parseSystem Management RAM analysis tool
Stars: ✭ 50 (-88.61%)
Recon My WayThis repository created for personal use and added tools from my latest blog post.
Stars: ✭ 271 (-38.27%)
Open Semantic SearchOpen Source research tool to search, browse, analyze and explore large document collections by Semantic Search Engine and Open Source Text Mining & Text Analytics platform (Integrates ETL for document processing, OCR for images & PDF, named entity recognition for persons, organizations & locations, metadata management by thesaurus & ontologies, search user interface & search apps for fulltext search, faceted search & knowledge graph)
Stars: ✭ 386 (-12.07%)
E4GL30S1NTE4GL30S1NT - Simple Information Gathering Tool
Stars: ✭ 139 (-68.34%)
ThehivedocsDocumentation of TheHive
Stars: ✭ 353 (-19.59%)
Midway🍔 A Node.js Serverless Framework for front-end/full-stack developers. Build the application for next decade. Works on AWS, Alibaba Cloud, Tencent Cloud and traditional VM/Container. Super easy integrate with React and Vue. 🌈
Stars: ✭ 5,080 (+1057.18%)
Drakvuf SandboxDRAKVUF Sandbox - automated hypervisor-level malware analysis system
Stars: ✭ 384 (-12.53%)
DDTTXDDTTX Tabletop Trainings
Stars: ✭ 22 (-94.99%)
The EndorserAn OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.
Stars: ✭ 269 (-38.72%)
EvilscanNodeJS Simple Network Scanner
Stars: ✭ 428 (-2.51%)
Malware JailSandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js
Stars: ✭ 349 (-20.5%)
Docker-OSINTContenido de herramientas OSINT con Docker. Tambien nos podes visitar en el canal de youtube (https://www.youtube.com/user/marcospr74/)
Stars: ✭ 15 (-96.58%)
HelkThe Hunting ELK
Stars: ✭ 3,097 (+605.47%)
ZeekZeek is a powerful network analysis framework that is much different from the typical IDS you may know.
Stars: ✭ 4,180 (+852.16%)
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (-21.41%)
PymispPython library using the MISP Rest API
Stars: ✭ 254 (-42.14%)
DorknetSelenium powered Python script to automate searching for vulnerable web apps.
Stars: ✭ 256 (-41.69%)
Envizonnetwork visualization & vulnerability management/reporting
Stars: ✭ 382 (-12.98%)
ZenFind emails of Github users
Stars: ✭ 343 (-21.87%)
CertaintyAutomated cacert.pem management for PHP projects
Stars: ✭ 255 (-41.91%)
KraneKubernetes RBAC static Analysis & visualisation tool
Stars: ✭ 254 (-42.14%)
XeuledocFetch information about a public Google document.
Stars: ✭ 344 (-21.64%)
ElectriceyeContinuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (-41.91%)
SpyGenTrojan 🐍 (keylogger, take screenshots, open your webcam) 🔓
Stars: ✭ 115 (-73.8%)