Trending repositories for topic security-automation
Automation to assess the state of your M365 tenant against CISA's baselines
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
DevSecOps, ASPM, Vulnerability Management. All on one platform.
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.
Security automation content in SCAP, Bash, Ansible, and other formats
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump...
Automation to assess the state of your M365 tenant against CISA's baselines
SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump...
Scans Software Bill of Materials (SBOMs) for security vulnerabilities
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
🤖 Admyral enables continuous control monitoring for any custom control
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
DevSecOps, ASPM, Vulnerability Management. All on one platform.
Code Scanning/SAST/Static Analysis/Linting using many tools/Scanners with One Report (Code, IaC) - Betterscan
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Security automation content in SCAP, Bash, Ansible, and other formats
🕵️ OSINT Tools for gathering information and actions forensics 🕵️
Automation to assess the state of your M365 tenant against CISA's baselines
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
DevSecOps, ASPM, Vulnerability Management. All on one platform.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.
SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump...
A command-line tool to get valuable information out of AWS CloudTrail
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump...
Automation to assess the state of your M365 tenant against CISA's baselines
SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
SecObserve is an open source vulnerability management system for software development and cloud environments. It supports a variety of open source vulnerability scanners and integrates easily into CI/...
🤖 Admyral enables continuous control monitoring for any custom control
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Scans Software Bill of Materials (SBOMs) for security vulnerabilities
A command-line tool to get valuable information out of AWS CloudTrail
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
DevSecOps, ASPM, Vulnerability Management. All on one platform.
Code Scanning/SAST/Static Analysis/Linting using many tools/Scanners with One Report (Code, IaC) - Betterscan
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Automation to assess the state of your M365 tenant against CISA's baselines
Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
DevSecOps, ASPM, Vulnerability Management. All on one platform.
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Security automation content in SCAP, Bash, Ansible, and other formats
🕵️ OSINT Tools for gathering information and actions forensics 🕵️
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 200 common, vulnerable components (openssl, libpng, libxml2, expat and others), or...
A command-line tool to get valuable information out of AWS CloudTrail
Infection Monkey - An open-source adversary emulation platform
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump...
With this tool, users can easily add credit card details, view saved cards, check card balances, and retrieve OTPs for verification
Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.
Automation to assess the state of your M365 tenant against CISA's baselines
SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.
A command-line tool to get valuable information out of AWS CloudTrail
SecObserve is an open source vulnerability management system for software development and cloud environments. It supports a variety of open source vulnerability scanners and integrates easily into CI/...
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
🤖 Admyral enables continuous control monitoring for any custom control
eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise Mission Assurance Support Service (eMASS) by leveraging its re...
🤖 Admyral enables continuous control monitoring for any custom control
RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and add reviewers. RedFlag's flexible configuration makes it valua...
Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environments. The scripts automate various tasks including LDAP querying, ...
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump...
Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.
Implement a powerful Tiering Security Model in Microsoft Entra for your Cloud Administrator identities using Azure Automation.
With this tool, users can easily add credit card details, view saved cards, check card balances, and retrieve OTPs for verification
Scan your web apps for vulnerabilities, misconfigurations, and other security issues with the Pentest-Tools.com command-line program.
Scan artifacts with Amazon Inspector from GitHub Actions workflows.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
🕵️ OSINT Tools for gathering information and actions forensics 🕵️
Automation to assess the state of your M365 tenant against CISA's baselines
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
DevSecOps, ASPM, Vulnerability Management. All on one platform.
Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Infection Monkey - An open-source adversary emulation platform
A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities and enables running traffic-based analysis of any type.
🤖 Admyral enables continuous control monitoring for any custom control
SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
Stalker, the Extensible Attack Surface Management tool.
Pen Test Report Generation and Assessment Collaboration
Implement a powerful Tiering Security Model in Microsoft Entra for your Cloud Administrator identities using Azure Automation.
AIShield Watchtower: Dive Deep into AI's Secrets! 🔍 Open-source tool by AIShield for AI model insights & vulnerability scans. Secure your AI supply chain today! ⚙️🛡️
Store and retrieve encrypted secrets with PowerShell on Windows, Linux, or MacOS and also from KeePass 2 databases on Windows
SecObserve is an open source vulnerability management system for software development and cloud environments. It supports a variety of open source vulnerability scanners and integrates easily into CI/...
Protect Operator Accounts And Prevent Unauthorized Access. Scan players for blacklisted permissions and unauthorized access
Identify hardcoded secrets in static structured text (version 2)
Awesome links to automate your cybersecurity checks
🕵️ OSINT Tools for gathering information and actions forensics 🕵️
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Re...
Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security researchers, pentesting, api security, network security, mobile s...