SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+8396.3%)
OpcdeOPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (+564.2%)
PasshuntPasshunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (+1086.42%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+759.26%)
OtsecaOpen source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Stars: ✭ 416 (+413.58%)
Recommendations for engineersAll of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 39 (-51.85%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+654.32%)
Robust Adv Malware DetectionCode repository for the paper "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware"
Stars: ✭ 63 (-22.22%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+5945.68%)
WalkoffA flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
Stars: ✭ 855 (+955.56%)
VuldashVulnerability Dashboard
Stars: ✭ 16 (-80.25%)
FlareAn analytical framework for network traffic and behavioral analytics
Stars: ✭ 363 (+348.15%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+735.8%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+10818.52%)
CheckmyhttpsWe propose a user-friendly add-on that allows you to check if your encrypted web traffic (SSL/TLS) towards secured Internet servers (HTTPS) is not intercepted (being listened to).
Stars: ✭ 35 (-56.79%)
Violent Python3Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 603 (+644.44%)
CarCyber Analytics Repository
Stars: ✭ 490 (+504.94%)
BesafeBeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-74.07%)
Fwdsh3llForward shell generation framework
Stars: ✭ 62 (-23.46%)
CspThe Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing confidence and trust among the national Computer Security Incident Response Teams (CSIRTs) of the Member States and for promoting swift and effective operational cooperation.
Stars: ✭ 23 (-71.6%)
Attack NavigatorWeb app that provides basic navigation and annotation of ATT&CK matrices
Stars: ✭ 887 (+995.06%)
WebmapWebMap-Nmap Web Dashboard and Reporting
Stars: ✭ 357 (+340.74%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-37.04%)
Packer FuzzerPacker Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (+829.63%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-14.81%)
H1stThe AI Application Platform We All Need. Human AND Machine Intelligence. Based on experience building AI solutions at Panasonic: robotics predictive maintenance, cold-chain energy optimization, Gigafactory battery mfg, avionics, automotive cybersecurity, and more.
Stars: ✭ 697 (+760.49%)
SmershSmersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
Stars: ✭ 43 (-46.91%)
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+734.57%)
CerteagleWeaponizing Live CT logs for automated monitoring of assets
Stars: ✭ 78 (-3.7%)
DawnscannerDawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
Stars: ✭ 642 (+692.59%)
Node Opcuaan implementation of a OPC UA stack fully written in javascript and nodejs - http://node-opcua.github.io/
Stars: ✭ 985 (+1116.05%)
NfstreamNFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+667.9%)
Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+1288.89%)
KeyloggerGet Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+645.68%)
Grab.jsfast TCP banner grabbing with node.js
Stars: ✭ 33 (-59.26%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+567.9%)
Awesome Wifi SecurityA collection of awesome resources related to 802.11 security, tools and other things
Stars: ✭ 79 (-2.47%)
Logkeys📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (+539.51%)
Netscan2active / passive network scanner
Stars: ✭ 27 (-66.67%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+475.31%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-22.22%)
BertyBerty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network
Stars: ✭ 5,101 (+6197.53%)
SootyThe SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (+970.37%)
ShuffleShuffle: A general purpose security automation platform platform. We focus on accessibility for all.
Stars: ✭ 424 (+423.46%)
RsfThe Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-6.17%)
BusterAn advanced tool for email reconnaissance
Stars: ✭ 387 (+377.78%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+371.6%)
ZileExtract API keys from file or url using by magic of python and regex.
Stars: ✭ 61 (-24.69%)
Probe spiderProbe_Spider is a Open Source Intelligence Tool made complete out of Python.
Stars: ✭ 20 (-75.31%)
ContentSecurity automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+1404.94%)
Azure SentinelCloud-native SIEM for intelligent security analytics for your entire enterprise.
Stars: ✭ 1,208 (+1391.36%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-9.88%)
Pcapxray❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (+1253.09%)
Riceteacatpandarepo with challenge material for riceteacatpanda (2020)
Stars: ✭ 18 (-77.78%)