Statistics for topic infosec
RepositoryStats tracks 635,084 Github repositories, of these 531 are tagged with the infosec topic. The most common primary language for repositories using this topic is Python (153). Other languages include: Go (73), Shell (37), HTML (29), JavaScript (23), C++ (13), C# (12), PowerShell (12)
Stargazers over time for topic infosec
Most starred repositories for topic infosec (view more)
Trending repositories for topic infosec (view more)
Hunt down social media accounts by username across social networks
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Modern web-based distributed hashcracking solution, built on hashcat
This repo Gathers all available cve exploits from github.⚠️ Be careful Malware.
A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc
Hunt down social media accounts by username across social networks
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
This repo Gathers all available cve exploits from github.⚠️ Be careful Malware.
Modern web-based distributed hashcracking solution, built on hashcat
A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc
A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Hunt down social media accounts by username across social networks
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_URL, https://freedium.cfd/Medium_URL
This repo Gathers all available cve exploits from github.⚠️ Be careful Malware.
A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Hunt down social media accounts by username across social networks
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Coeus 🌐 is an OSINT ToolBox empowering users with tools for effective intelligence gathering from open sources. From social media monitoring 📱 to data analysis 📊, it offers a centralized platform f...
Sasori is a dynamic web crawler powered by Puppeteer, designed for lightning-fast endpoint discovery.
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.
Explore cybersecurity’s market dynamics through public companies, capital flows, acquisitions, and product segments.