Security tools, cryptography, and vulnerability research
2,620 repositories found
A tool to quickly identify relevant, publicly-available open source intelligence ("OSINT") tools and resources, saving valuable time during investigations, research, and analysis.
A security research site.
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
A curriculum for a high school cyber security course.
A curated list of tools officially presented at Black Hat events
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Ransomwares Collection. Don't Run Them on Your Device.
An OSINT tool that helps detect members of a company with leaked credentials
A concise, directive, specific, flexible, and free incident response plan template
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15
Live Feed of C2 servers, tools, and botnets
Practical Windows Forensics Training
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus software when creating backdoors!
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
Dawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
Lilith - Foundational reverse engineering resource for cybersecurity entrepreneurs in C++
A tool that shows detailed information about named pipes in Windows
Open Source Cloud Security
An AI-powered Personal Identifiable Information (PII) scanner.
Antenna是58同城安全团队打造的一款辅助安全从业人员验证网络中多种漏洞是否存在以及可利用性的工具。其基于带外应用安全测试(OAST)通过任务的形式,将不同漏洞场景检测能力通过插件的形式进行集合,通过与目标进行out-bind的数据通信方式进行辅助检测。
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Shellcode injection technique. Given as C++ header, standalone Rust program or library.
Get All Registered Wifi Passwords from Target Computer.
Resources for Application Security including Web, API, Android, iOS and Thick Client
This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifically for use with Evilginx3. May be updated periodically.
Emora is an OSINT tool like sherlock but with a GUI, which search for accounts by username across social networks
Scirius is a web application for Suricata ruleset management and threat hunting.
A python module for working with ATT&CK
GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise
Collection of knowledge about information security