Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
This chef cookbook provides numerous security-related configurations, providing all-round base protection.
Scripts built from our Guide to User Data Security
Security event correlation engine for ELK stack
Учебное пособие по защите информации кафедры радиотехники и систем управления МФТИ
:notebook: Some security related notes
用于记录企业安全规划,建设,运营,攻防的相关资源
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine...
TESLA PowerWall 2 Security Shenanigans
How Secure is My Password for your own website
Kubernetes security tool for policy enforcement
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux...
Investigate suspicious activity by visualizing Sysmon's event log
Red Team Tactics, Techniques, and Procedures
Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization
OCI (Open Containers Initiative) compatible runtime for Intel® Architecture
Research on GraphQL from an AppSec point of view.
Secure Content Management for the Modern Web - "The sky is only the beginning"
Droidefense: Advance Android Malware Analysis Framework
Public version of PagerDuty's employee security training courses.
Open source backup solution for your network
The DIME resolver library and command line utilities.
Data analysis and OSINT framework for Twitter
Security library for Play framework 2/3 in Java and Scala: OpenID Connect, SAML2, CAS, OAuth, LDAP, JWT...
Add Rate Limiting To Your GraphQL Resolvers 💂♀️
Python Remote Administration Tool (RAT) to gain meterpreter session
Is TLS fast yet? Yes, yes it is.
h2t (HTTP Hardening Tool) scans a website and suggests security headers to apply
A tool to update your project's dependencies on GitHub. Runs on pyup.io, comes with a command line interface.
Artifact analysis tools by JPCERT/CC Analysis Center
Free cross-platform deniable encryption cryptoarchiver
A collection of the latest AWS Security workshops
Proactively protect your Node.js web services
Integrates Dependency-Check reports into SonarQube
Simple and secure image uploader in PHP
HTTP file upload scanner for Burp Proxy
Secure, Unified, Powerful and Extensible Rust Android Analyzer
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account...
This repository contains full code examples from the book Gray Hat C#
A Keychain helper for iOS to make it very simple to store/obtain values from iOS Keychain
ADAMANT Blockchain Node
A Comprehensive Web Fuzzer and Content Discovery Tool
🗣️ A book and repo to get you started programming voice computing applications in Python (10 chapters and 200+ scripts).
An implementation of TEMPEST en GNU Radio
SAMM stands for Software Assurance Maturity Model.
Guide to using a remote Debian server for security and privacy services
[ABANDONED] Two-factor authentication for Symfony 2 & 3 applications 🔐. Please use the newer versions from https://github.com/scheb/2fa.
Quickly secure UNIX/Linux systems
Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.
Volatility plugin for extracts configuration data of known malware
CIS Docker Benchmark - InSpec Profile