Trending repositories for topic cybersecurity
Hunt down social media accounts by username across social networks
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
Open-source tool to enforce privacy & security best-practices on Windows, macOS and Linux, because privacy is sexy
serve as a reverse proxy to protect your web services from attacks and exploits.
A collection of several hundred online tools for OSINT
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
The ESP32-BlueJammer disrupts Bluetooth devices using an ESP32 NodeMCU and nRF module, causing DoS attacks. It interrupts audio in speakers, blocks smartphone connections, and disrupts IoT and industr...
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Hacking.
🛡️ Open-source and next-generation Web Application Firewall (WAF)
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM and embedded RISC-V architectures.
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
SubnetWizard is a Python Based CLI tools for subnet calculating
The ESP32-BlueJammer disrupts Bluetooth devices using an ESP32 NodeMCU and nRF module, causing DoS attacks. It interrupts audio in speakers, blocks smartphone connections, and disrupts IoT and industr...
An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as-Code
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Hacking.
Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems. This tool is intended to raise awareness about cybersecurit...
A resource containing all the tools each ransomware gangs uses
📚 a modular easy to use Library for Static Analysis aiming at multi-language analysis
Welcome to the Cybersecurity Career Accelerator Repository! This repository is tailored to help aspiring cybersecurity professionals prepare for the CompTIA Security+ certification exam, an essential ...
A curated list of annual cyber security reports
Final Year Malware Detection Project with PPT, Research Paper, code and Synopsis. Malware detection project by Machine Learning ALgorithms.
HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the p...
Este repositório é um acervo abrangente de tecnologias e tópicos relacionados a TI e Desenvolvimento, oferecendo recursos e materiais para aprendizado e referência em diversas áreas de interesse da co...
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
CyberPunkOS is a virtual machine that incorporates several tools for Open Source Intelligence (OSINT) to dismantle Fake News
A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or earning relevant certifications.
Hunt down social media accounts by username across social networks
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
serve as a reverse proxy to protect your web services from attacks and exploits.
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, cov...
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM and embedded RISC-V architectures.
A resource containing all the tools each ransomware gangs uses
A collection of several hundred online tools for OSINT
🛡️ Open-source and next-generation Web Application Firewall (WAF)
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
A curated list of Awesome Threat Intelligence Blogs from the DOGESEC community.
Open-source tool to enforce privacy & security best-practices on Windows, macOS and Linux, because privacy is sexy
SubnetWizard is a Python Based CLI tools for subnet calculating
The ESP32-BlueJammer disrupts Bluetooth devices using an ESP32 NodeMCU and nRF module, causing DoS attacks. It interrupts audio in speakers, blocks smartphone connections, and disrupts IoT and industr...
İçerisinde her biri özenle yazılmış, 80'den fazla siber güvenlik aracı bulunan kapsamlı bir siber güvenlik aracı.
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump...
Welcome to the Cybersecurity Career Accelerator Repository! This repository is tailored to help aspiring cybersecurity professionals prepare for the CompTIA Security+ certification exam, an essential ...
A curated list of Awesome Threat Intelligence Blogs from the DOGESEC community.
termux4all is not a project or something. This is some packages that can be used for the development and security purposes on android phone using the termux app itself. The main purpose of this proje...
A resource containing all the tools each ransomware gangs uses
Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programming, Web App Security, Cloud Security, Devsecops, Ethical Hack...
A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networks
Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems. This tool is intended to raise awareness about cybersecurit...
📚 a modular easy to use Library for Static Analysis aiming at multi-language analysis
VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allowin...
A curated list of awesome applications, software, tools, and resources for using OpenBSD as a daily driver.
The content in this repo is based on the self-paced course called Certified in Cybersecurity from (ISC)2, which is a preparation for (ISC)2 Certified in Cybersecurity. And Also Dump Question which wil...
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allowin...
A powerfull websites compiler for optimization or intellectual property protection purposes.
Hunt down social media accounts by username across social networks
🛡️ Open-source and next-generation Web Application Firewall (WAF)
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
A resource containing all the tools each ransomware gangs uses
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
serve as a reverse proxy to protect your web services from attacks and exploits.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, cov...
A collection of several hundred online tools for OSINT
A collection of awesome security hardening guides, tools and other resources
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM and embedded RISC-V architectures.
You can get a lifetime of FREE VPS using GitHub Codespaces with Kali Linux Docker image installed on github workspace terminal.
A resource containing all the tools each ransomware gangs uses
VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allowin...
The ESP32-BlueJammer disrupts Bluetooth devices using an ESP32 NodeMCU and nRF module, causing DoS attacks. It interrupts audio in speakers, blocks smartphone connections, and disrupts IoT and industr...
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump...
Welcome to the Cybersecurity Career Accelerator Repository! This repository is tailored to help aspiring cybersecurity professionals prepare for the CompTIA Security+ certification exam, an essential ...
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SC...
VulnAPI is an open-source project designed to help you scan your APIs for common security vulnerabilities and weaknesses.
A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networks
termux4all is not a project or something. This is some packages that can be used for the development and security purposes on android phone using the termux app itself. The main purpose of this proje...
Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programming, Web App Security, Cloud Security, Devsecops, Ethical Hack...
A curated list of awesome applications, software, tools, and resources for using OpenBSD as a daily driver.
This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.
A curated list of Awesome Threat Intelligence Blogs from the DOGESEC community.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec and Audit Management and supporting +57 frameworks worldwide with auto-mapping: NIST CSF, ISO 27001, SOC2, CIS, PCI DSS, NIS2, CMMC, PS...
Logging Made Easy (LME) is a no-cost and open logging and protective monitoring solution serving all organizations.
The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make the most of Netlas.io.
Emora is an OSINT tool like sherlock but with a GUI, which search for accounts by username across social networks
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or earning relevant certifications.
Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).
Microsoft Copilot for Security is a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders to improve security outcomes at machine speed and scale, wh...
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Hacking.
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
Every practical and proposed defense against prompt injection.
Hunt down social media accounts by username across social networks
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
serve as a reverse proxy to protect your web services from attacks and exploits.
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, cov...
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
🛡️ Open-source and next-generation Web Application Firewall (WAF)
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM and embedded RISC-V architectures.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
A collection of several hundred online tools for OSINT
Open-source tool to enforce privacy & security best-practices on Windows, macOS and Linux, because privacy is sexy
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make the most of Netlas.io.
Emora is an OSINT tool like sherlock but with a GUI, which search for accounts by username across social networks
skytrack is a planespotting and aircraft OSINT tool made using Python 🛩🔍
Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).
The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, ZAP, Nuclei, SkipFish, and Wapiti.
Taranis AI is an advanced Open-Source Intelligence (OSINT) tool, leveraging Artificial Intelligence to revolutionize information gathering and situational analysis.
CyberPunkOS is a virtual machine that incorporates several tools for Open Source Intelligence (OSINT) to dismantle Fake News
Every practical and proposed defense against prompt injection.
A curated list of GPT agents for cybersecurity
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
The perfect butler for pentesters, bug-bounty hunters and security researchers
Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utilized by bug hunters, penetration testers, and security enthusiast...