232 results for “topic:defensive-security”
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
A curated list of tools officially presented at Black Hat events
Open-source attack surface management and authorized security automation platform for asset discovery, service probing, scan orchestration, and security result management.
Anti-forensic macOS tray application designed to safeguard your system by monitoring USB ports.
DejaVU - Open Source Deception Framework
No description provided.
PowerShell scripts for communicating with a remote host.
Tools & Resources for Cyber Security Operations
Detecting ATT&CK techniques & tactics for Linux
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing your own network to ensure there are no malicious services running.
An open-source knowledge base of defensive countermeasures to protect AI/ML systems. Features interactive views and maps defenses to known threats from frameworks like MITRE ATLAS, MAESTRO, and OWASP.
Curated collection of cybersecurity tools featured in Black Hat Arsenal events.
PHP ransomware that encrypts your files, as well as file and directory names.
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
Bypass Malware Time Delays
CLI client (and Golang module) for deps.dev API. Free access to dependencies, licenses, advisories, and other critical health and security signals for open source package versions.
Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.
Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
Windows Administrator level Implant.
🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty, Red/Blue Team, OSINT, Malware Analysis, CEH, OSCP, CISSP, CHFI, Network Security, Kali Linux, Web Security & more. Free, organized, and clickable. Knowledge should be accessible to everyone.
Highly customizable low-interaction experimental honeypot that mimics specific hosts.
RevEng.AI Toolkit and Python API
IP-Abuse Reporting System & IP/Network/ASN Risk-Databases
This repository will describe the details surrounding the SIEM (wazuh) mini project, which will cover all aspects of topology design, deployment, rules, integration, and fine tune.
A free, no-paywall cybersecurity self-study library covering foundations, pentesting, web security, exploit development, malware analysis, cryptography, defense, and programming. Books are organized by domain and difficulty with a guided learning path so beginners can progress to advanced security skills independently.
Automatically deactivate leaked AWS access keys for IAM users flagged by the AWSCompromisedKeyQuarantineV* policy
Secure website with a registration, sign in, session management, and CRUD controls.