Trending repositories for topic cybersecurity
Hunt down social media accounts by username across social networks
serve as a reverse proxy to protect your web services from attacks and exploits.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, cov...
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
[NeurIPS 2024] SWE-agent takes a GitHub issue and tries to automatically fix it, using GPT-4, or your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges...
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Hacking.
The ESP32-BlueJammer (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts various devices using an ESP32 and nRF24 modules, causing plenty of noise and sending unnecessary packets (DoS). It...
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
Open-source tool to enforce privacy & security best-practices on Windows, macOS and Linux, because privacy is sexy
A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or earning relevant certifications.
A multi-vault secret injection tool for safely injecting secrets into app environment
Stratosphere Cyber Range to learn cybersecurity attacking and defending techniques locally in your computer
The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security professionals in cyber defense and intelligence.
🪝Hacking Social Media Accounts by using Phishing Mails (GoPhish) 🐬
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Hacking.
The ESP32-BlueJammer (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts various devices using an ESP32 and nRF24 modules, causing plenty of noise and sending unnecessary packets (DoS). It...
The Web3 Security Resources Hub is a comprehensive collection of curated tools, guides, and best practices for securing decentralized systems and smart contracts in the blockchain space.
A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase
The content in this repo is based on the self-paced course called Certified in Cybersecurity from (ISC)2, which is a preparation for (ISC)2 Certified in Cybersecurity. And Also Dump Question which wil...
You can get a lifetime of FREE VPS using GitHub Codespaces with Kali Linux Docker image installed on github workspace terminal.
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable ...
termux4all is not a project or something. This is some packages that can be used for the development and security purposes on android phone using the termux app itself. The main purpose of this proje...
This is the main repository of International Data Spaces Association on GitHub, where you can find general overview and useful information on IDS Landscape.
Hunt down social media accounts by username across social networks
serve as a reverse proxy to protect your web services from attacks and exploits.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, cov...
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated daily.
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
[NeurIPS 2024] SWE-agent takes a GitHub issue and tries to automatically fix it, using GPT-4, or your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges...
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Hacking.
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
Open-source tool to enforce privacy & security best-practices on Windows, macOS and Linux, because privacy is sexy
A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or earning relevant certifications.
Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated daily.
A multi-vault secret injection tool for safely injecting secrets into app environment
Stratosphere Cyber Range to learn cybersecurity attacking and defending techniques locally in your computer
The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security professionals in cyber defense and intelligence.
🪝Hacking Social Media Accounts by using Phishing Mails (GoPhish) 🐬
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Hacking.
The Web3 Security Resources Hub is a comprehensive collection of curated tools, guides, and best practices for securing decentralized systems and smart contracts in the blockchain space.
A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase
The content in this repo is based on the self-paced course called Certified in Cybersecurity from (ISC)2, which is a preparation for (ISC)2 Certified in Cybersecurity. And Also Dump Question which wil...
You can get a lifetime of FREE VPS using GitHub Codespaces with Kali Linux Docker image installed on github workspace terminal.
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable ...
termux4all is not a project or something. This is some packages that can be used for the development and security purposes on android phone using the termux app itself. The main purpose of this proje...
This is the main repository of International Data Spaces Association on GitHub, where you can find general overview and useful information on IDS Landscape.
A multi-vault secret injection tool for safely injecting secrets into app environment
OpenAI o1 advanced reasoning powered vulnerable web page generator for testing and educational purposes
A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.
Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated daily.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Hunt down social media accounts by username across social networks
serve as a reverse proxy to protect your web services from attacks and exploits.
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, cov...
[NeurIPS 2024] SWE-agent takes a GitHub issue and tries to automatically fix it, using GPT-4, or your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges...
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.
The ESP32-BlueJammer (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts various devices using an ESP32 and nRF24 modules, causing plenty of noise and sending unnecessary packets (DoS). It...
🛡️ Open-source and next-generation Web Application Firewall (WAF)
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM and embedded RISC-V architectures.
A collection of several hundred online tools for OSINT
Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.
A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.
This is the open sourced code for the extension, EndPointer
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
PyVerse is an open-source collection of diverse Python projects, tools, and scripts, ranging from beginner to advanced, across various domains like machine learning, web development, and automation.
API Security Vulnerability Scanner designed to help you secure your APIs.
Git Exposed leverages the unintended exposure of .git directories to clone and reconstruct complete projects, providing a clear window into potential vulnerabilities.
The ESP32-BlueJammer (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts various devices using an ESP32 and nRF24 modules, causing plenty of noise and sending unnecessary packets (DoS). It...
All of my personal notes on topics including Hacking, Coding, Math, Data-Structures, and more! Open to all for use!
This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.
🪝Hacking Social Media Accounts by using Phishing Mails (GoPhish) 🐬
termux4all is not a project or something. This is some packages that can be used for the development and security purposes on android phone using the termux app itself. The main purpose of this proje...
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Hacking.
A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.
[NeurIPS 2024] SWE-agent takes a GitHub issue and tries to automatically fix it, using GPT-4, or your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges...
The open source Tines / Splunk SOAR alternative for security engineers.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or earning relevant certifications.
Emora is an OSINT tool like sherlock but with a GUI, which search for accounts by username across social networks
The ESP32-BlueJammer (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts various devices using an ESP32 and nRF24 modules, causing plenty of noise and sending unnecessary packets (DoS). It...
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Hacking.
Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).
Microsoft Copilot for Security is a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders to improve security outcomes at machine speed and scale, wh...
Every practical and proposed defense against prompt injection.
🤖 Admyral enables continuous control monitoring for any custom control
Hunt down social media accounts by username across social networks
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
[NeurIPS 2024] SWE-agent takes a GitHub issue and tries to automatically fix it, using GPT-4, or your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges...
serve as a reverse proxy to protect your web services from attacks and exploits.
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, cov...
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
🛡️ Open-source and next-generation Web Application Firewall (WAF)
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
The open source Tines / Splunk SOAR alternative for security engineers.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM and embedded RISC-V architectures.
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
A collection of several hundred online tools for OSINT
The open source Tines / Splunk SOAR alternative for security engineers.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Emora is an OSINT tool like sherlock but with a GUI, which search for accounts by username across social networks
Pull Request-like Review/Approval flow for database queries. For compliant but smooth Engineering access to production.
skytrack is a planespotting and aircraft OSINT tool made using Python 🛩🔍
CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec and Audit Management and supporting +60 frameworks worldwide with auto-mapping: NIST CSF, ISO 27001, SOC2, CIS, PCI DSS, NIS2, CMMC, PS...
This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
Fully automated host & network intrusion detection platform. Detects malware from behavioural patterns rather than signatures and enables deeper visibility than legacy tools.
Every practical and proposed defense against prompt injection.
A curated list of GPT agents for cybersecurity
SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.
Taranis AI is an advanced Open-Source Intelligence (OSINT) tool, leveraging Artificial Intelligence to revolutionize information gathering and situational analysis.
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.