Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+86.57%)
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-93.7%)
NfstreamNFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+3.15%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-90.05%)
PoW-ShieldProject dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (-83.58%)
Easyserverdev操作系统层面提供的 API 会在相当长的时间内保持接口不变,一旦学成,终生受用。理解和掌握这些基础 socket API 不仅可以最大化地去定制各种网络通信框架,更不用说使用市面上流行的网络通信库了,最重要的是,它会是你排查各种网络疑难杂症坚实的技术保障。
Stars: ✭ 323 (-46.43%)
ShuffleShuffle: A general purpose security automation platform platform. We focus on accessibility for all.
Stars: ✭ 424 (-29.68%)
MalsubA Python RESTful API framework for online malware analysis and threat intelligence services.
Stars: ✭ 308 (-48.92%)
CcatCloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (-50.25%)
CybersecurityA curriculum for a high school cyber security course.
Stars: ✭ 329 (-45.44%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-29.19%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+855.72%)
CarCyber Analytics Repository
Stars: ✭ 490 (-18.74%)
OtsecaOpen source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Stars: ✭ 416 (-31.01%)
OpcdeOPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (-10.78%)
ChepyChepy is a python lib/cli equivalent of the awesome CyberChef tool.
Stars: ✭ 295 (-51.08%)
Quiche🥧 Savoury implementation of the QUIC transport protocol and HTTP/3
Stars: ✭ 5,481 (+808.96%)
SubzySubdomain takeover vulnerability checker
Stars: ✭ 287 (-52.4%)
CyberscanCyberScan: Network's Forensics ToolKit
Stars: ✭ 280 (-53.57%)
FlareAn analytical framework for network traffic and behavioral analytics
Stars: ✭ 363 (-39.8%)
FpndPython package for freepn network daemon
Stars: ✭ 271 (-55.06%)
Hack-UtilsScript to facilitate different functions and checks
Stars: ✭ 27 (-95.52%)
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (-46.27%)
Message IoEvent-driven message library for building network applications easy and fast.
Stars: ✭ 321 (-46.77%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-14.26%)
NmapguiAdvanced Graphical User Interface for NMap
Stars: ✭ 318 (-47.26%)
Appinfoscanner一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Stars: ✭ 424 (-29.68%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (-48.42%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (-10.28%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+477.94%)
Packet SnifferA pure-Python Network Packet Sniffing tool
Stars: ✭ 428 (-29.02%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (-22.72%)
WebmapWebMap-Nmap Web Dashboard and Reporting
Stars: ✭ 357 (-40.8%)
Red-Team-EssentialsThis repo will contain some basic pentest/RT commands.
Stars: ✭ 22 (-96.35%)
Tkeed🌎 High Performance HTTP WebServer
Stars: ✭ 485 (-19.57%)
Adversary emulation libraryAn open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (-51.08%)
BusterAn advanced tool for email reconnaissance
Stars: ✭ 387 (-35.82%)
Attack ScriptsScripts and a (future) library to improve users' interactions with the ATT&CK content
Stars: ✭ 290 (-51.91%)
AmassIn-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+942.12%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+480.93%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-36.65%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-54.89%)
CaptfencoderCaptfEncoder是一款跨平台网络安全工具套件,提供网络安全相关编码转换、古典密码、密码学、特殊编码等工具,并聚合各类在线工具。
Stars: ✭ 473 (-21.56%)
NetpalmReST based network device broker
Stars: ✭ 270 (-55.22%)
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-97.35%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-84.91%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (-41.46%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-89.88%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+712.11%)
InteractivecanvasLibrary for distribution canvas animation over set of devices
Stars: ✭ 351 (-41.79%)
FakeUSBMake your own BadUSB device!
Stars: ✭ 14 (-97.68%)
BatfishBatfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
Stars: ✭ 592 (-1.82%)