Security tools, cryptography, and vulnerability research
2,620 repositories found
A curated list of cybersecurity tools and resources.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
awesome cloud security 收集一些国内外不错的云安全资源,该项目主要面向国内的安全人员
Fix Inventory helps you identify and remove the most critical risks in AWS, GCP, Azure and Kubernetes.
Sample queries for Advanced hunting in Microsoft 365 Defender
A comprehensive, step-by-step guide to mastering cybersecurity from beginner to expert level with curated resources, tools, and career guidance
Open-source tool to bypass windows and linux passwords from bootable usb
A curated list of amazingly awesome Cybersecurity datasets
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A secure low code honeypot framework, leveraging AI for System Virtualization.
Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
VirusTotal Wanna Be - Now with 100% more Hipster
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
:snowflake: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Educational, CTF-styled labs for individuals interested in Memory Forensics
OSINT cheat sheet, list OSINT tools, wiki, dataset, article, book , red team OSINT for hackers and OSINT tips and OSINT branch. This repository will grow every time will research, there is a research, science and technology, tutorial. Please use it wisely.
JA4+ is a suite of network fingerprinting standards
Metlo is an open-source API security platform.
A simple FOFA client written in JavaFX. Made by WgpSec, Maintained by f1ashine.
Interactively find and recover deleted or :point_right: overwritten :point_left: files from your terminal
You didn't think I'd go and leave the blue team out, right?
网络信息安全从业者面试指南
Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
A curated knowledge base to build, run and mature a SOC (including CSIRT).
Open Adversarial Exposure Validation Platform
Unlocking the Full Potential of OPC UA with Typescript and NodeJS - http://node-opcua.github.io/
Splunk Security Content
An AI-powered agentic red team framework that automates offensive security operations, from reconnaissance to exploitation to post-exploitation, with zero human intervention.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.