Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Detect, analyze and uniquely identify crashes in Windows applications
Github repository dedicated to the mooltipass project
honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambd...
Wazuh - Ruleset
The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).
Python logger with multiple features.
Checksec, but for Windows: static detection of security mitigations in executables
Integration of Clair and Docker Registry
A small client application that uses the Duo Labs EFIgy API to inform you about the state of your Mac EFI firmware
Advanced Graphical User Interface for NMap
Bridge from the pac4j security library to Shiro
study material used for the 2018 CISSP exam
Safe Browsing API Go Client
Fast HTTP enumerator
Capability-oriented version of the Rust standard library
This repository is a collection of resources to prepare for the Certified Kubernetes Security Specialist (CKSS) exam.
Automated CIS Benchmark Compliance Remediation for RHEL 7 with Ansible
Framework for running BPF programs with rules on Linux as a daemon. Container aware.
Aardvark is a multi-account AWS IAM Access Advisor API
A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.
Capillary is a library to simplify the sending of end-to-end encrypted push messages from Java-based application servers to Android clients.
Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support
Credential stuffing engine built for security professionals
Smart Contract security audit reports
Awesome Ruby Security resources
Minimalist secure text editor and binary encryptor that implements RFC 4880 Open PGP format: symmetrically encrypted, compressed and integrity protect...
Web漏洞演练平台
QNSM is network security monitoring framework based on DPDK.
Android security guides, roadmap, docs, courses, write-ups, and teryaagh.
A desktop application that checks security-related settings and makes recommendations for improvements without requiring central device management or...
🔓✨🔒 An innovative, convenient and secure encryption app
Web application vulnerability scanner
Public append-only ledger microservice built with Slim Framework
A high performance DNS cache designed for Content Delivery Networks
Go fearless SQL. Sqlvet performs static analysis on raw SQL queries in your Go code base.
A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tpo/network-hea...
Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark
Proof of concept for abusing Telegram's "People Near Me" feature and tracking people's location
DongTai is an interactive application security testing(IAST) product that supports the detection of OWASP WEB TOP 10 vulnerabilities, multi-request re...
An in depth tutorial on how to do binary exploitation
This chef cookbook provides numerous security-related configurations, providing all-round base protection.
A comfortable update solution for .NET-applications.
Учебное пособие по защите информации кафедры радиотехники и систем управления МФТИ
Security event correlation engine for ELK stack
Scripts built from our Guide to User Data Security
:notebook: Some security related notes
用于记录企业安全规划,建设,运营,攻防的相关资源
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine...
Investigate suspicious activity by visualizing Sysmon's event log