Statistics for topic cybersecurity
RepositoryStats tracks 595,858 Github repositories, of these 964 are tagged with the cybersecurity topic. The most common primary language for repositories using this topic is Python (352). Other languages include: Go (49), HTML (48), Shell (43), Jupyter Notebook (36), JavaScript (32), TypeScript (29), C++ (26), PowerShell (24), C (23)
Stargazers over time for topic cybersecurity
Most starred repositories for topic cybersecurity (view more)
Trending repositories for topic cybersecurity (view more)
🕵️♂️ Collect a dossier on a person by username from thousands of sites
A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
serve as a reverse proxy to protect your web services from attacks and exploits.
Automation to assess the state of your M365 tenant against CISA's baselines
Hunt down social media accounts by username across social networks
A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
Cybersources is a repository that curates a comprehensive collection of cybersecurity tools and resources, aiming to enhance knowledge, skills, and collaboration within the cybersecurity community.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Multi-services Asynchronous Honeypot Solution with real-time threat detection
The ESP32-BlueJammer (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts various devices using an ESP32 and nRF24 modules, causing plenty of noise and sending unnecessary packets (DoS). It...
🕵️♂️ Collect a dossier on a person by username from thousands of sites
Hunt down social media accounts by username across social networks
serve as a reverse proxy to protect your web services from attacks and exploits.
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
Cybersources is a repository that curates a comprehensive collection of cybersecurity tools and resources, aiming to enhance knowledge, skills, and collaboration within the cybersecurity community.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
Multi-services Asynchronous Honeypot Solution with real-time threat detection
LLM Agent and Evaluation Framework for Autonomous Penetration Testing
Cybersources is a repository that curates a comprehensive collection of cybersecurity tools and resources, aiming to enhance knowledge, skills, and collaboration within the cybersecurity community.
LLM Agent and Evaluation Framework for Autonomous Penetration Testing
🕵️♂️ Collect a dossier on a person by username from thousands of sites
serve as a reverse proxy to protect your web services from attacks and exploits.
Hunt down social media accounts by username across social networks
🛡️ Open-source and next-generation Web Application Firewall (WAF)
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emerging technologies. Ideal for learners and enthusiasts looking t...
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies Indicators of Compromise with unmatched precision across diverse ...
SWE-agent takes a GitHub issue and tries to automatically fix it, using GPT-4, or your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges. [NeurIPS 2024...
The open source Tines / Splunk SOAR alternative for security engineers.
The ESP32-BlueJammer (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts various devices using an ESP32 and nRF24 modules, causing plenty of noise and sending unnecessary packets (DoS). It...
A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or earning relevant certifications.
Hunt down social media accounts by username across social networks
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
SWE-agent takes a GitHub issue and tries to automatically fix it, using GPT-4, or your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges. [NeurIPS 2024...
serve as a reverse proxy to protect your web services from attacks and exploits.
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, cov...
The open source Tines / Splunk SOAR alternative for security engineers.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Emora is an OSINT tool like sherlock but with a GUI, which search for accounts by username across social networks
CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec and Audit Management and supporting +70 frameworks worldwide with auto-mapping: NIST CSF, ISO 27001, SOC2, CIS, PCI DSS, NIS2, CMMC, PS...