Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/tzurilabs/awesome-cyber-security

A bunch of resources containing learning resources, certifications, security frameworks, bug bounties, podcasts and tools used for cyber security.
https://github.com/tzurilabs/awesome-cyber-security

List: awesome-cyber-security

awesome cybersecurity hacktoberfest resources

Last synced: about 2 months ago
JSON representation

A bunch of resources containing learning resources, certifications, security frameworks, bug bounties, podcasts and tools used for cyber security.

Awesome Lists containing this project

README

        

# Cyber Security Awesome [![Awesome](https://awesome.re/badge.svg)](https://awesome.re)

> A bunch of resources containing learning resources, certifications, security frameworks, bug bounties, podcasts and tools used for cyber security. This repository focuses primarily on hands on stuffs instead of theoritical ones.

## Table of Contents

- [Learning Resources](#learning-resources)
- [Basic Concepts](#basic-concepts)
- [Cyber Security Learning Platforms](#cyber-security-learning-platforms)
- [Books](#books)
- [Youtube Channels](#youtube-channels)
- [CTF Platforms](#ctf-platforms)
- [Certifications](#certifications)
- [Red Team Certifications](#red-team-certifications)
- [Blue Team Certifications](#blue-team-certifications)
- [Other Certifications](#other-certifications)
- [Security Frameworks](#security-frameworks)
- [Bug Bounties](#bug-bounties)
- [Podcasts](#podcasts)
- [Tools](#tools)
- [Web Application Pentesting](#web-application-pentesting)
- [Network Pentesting](#network-pentesting)
- [Software Security](#software-security)
- [Network Security](#network-security)
- [Forensics](#forensics)
- [Misc](#misc)
- [More awesome repos](#more-awesome-repos-actively-maintained)

## Learning Resources

> Some learning resources which includes basic concepts, books, youtube channels, CTF platforms and certifications

### Basic Concepts

- [Networking fundamentals (HackTheBox Academy)](https://academy.hackthebox.com/module/details/34) - An introduction to networking concepts, protocols, and architecture, designed to build a foundation for cybersecurity.
- [Practical Networking](https://github.com/arsitektur-jaringan-komputer/Modul-Jarkom) - A GitHub repository providing practical learning modules for computer networking fundamentals.
- [Linux OS fundamentals (HackTheBox Academy)](https://academy.hackthebox.com/module/details/18) - A course covering the essential concepts and tools of the Linux operating system for cybersecurity purposes.
- [Practical OS fundamentals](https://github.com/arsitektur-jaringan-komputer/Modul-Sisop) - A resource that provides practical knowledge on operating system fundamentals, focusing on key concepts like processes and memory management.
- [Web programming fundamentals: HTML and CSS basics (Freecodecamp)](https://www.freecodecamp.org/learn/2022/responsive-web-design/) - A beginner-friendly course covering the fundamentals of HTML and CSS for building web pages.
- [Web programming fundamentals: Javascript basics (Freecodecamp)](https://www.freecodecamp.org/learn/javascript-algorithms-and-data-structures-v8/) - A comprehensive course teaching JavaScript programming, focusing on algorithms and data structures.
- [Programming fundamentals: Python basics (Freecodecamp)](https://www.freecodecamp.org/learn/scientific-computing-with-python/) - A course teaching the basics of Python programming, designed for beginners and covering fundamental concepts.
- [Web fundamentals (Angela Yu, Udemy)](https://www.udemy.com/share/1013gG3@XBrdbm-eaGL_qfZudC5lNK8rYkRD1QJX7AfJkYLBNN7t7BW9sUOvb9OwKJuBKOMH/) - A comprehensive course on web development covering HTML, CSS, JavaScript, and backend fundamentals.
- [Relational Database fundamentals with SQL (Freecodecamp)](https://www.freecodecamp.org/learn/relational-database/) - A course that teaches relational database concepts and SQL for querying and managing databases.
- [Backend API fundamentals using Expressjs (Freecodecamp)](https://www.freecodecamp.org/learn/back-end-development-and-apis/) - A course focused on building backend APIs using Express.js, teaching how to handle HTTP requests and data.

### Cyber Security Learning Platforms

- [HackTheBox Academy](https://academy.hackthebox.com) - A learning platform by HackTheBox offering structured courses on hacking and cybersecurity skills.
- [TryHackMe](https://tryhackme.com) - An interactive site where users can learn and practice cybersecurity with hands-on labs and challenges.
- [Portswigger Web Security Learning](https://portswigger.net/web-security/learning-paths) - A resource that teaches web security through guided learning paths and interactive labs focused on real-world vulnerabilities.
- [CyberDefenders](https://cyberdefenders.org/) - A platform providing blue team (defense) challenges and training for cybersecurity professionals.
- [CryptoHack](https://cryptohack.org/) - A platform focused on cryptography challenges, helping users learn and practice breaking cryptographic systems.
- [Pwnable](https://pwnable.tw/) - A site with reverse engineering and binary exploitation challenges designed to improve hacking skills.
- [PwnCollege](https://pwn.college/) - An educational platform offering courses on cybersecurity, with a focus on binary exploitation and advanced topics.
- [Crackmes](https://crackmes.one/) - A community-driven platform where users can solve reverse engineering challenges (crackmes) to enhance their skills.

### Books

- [Web Application Hacker's Handbook](https://books.google.co.id/books/about/The_Web_Application_Hacker_s_Handbook.html?id=NSBHAAAAQBAJ&source=kp_book_description&redir_esc=y) - A comprehensive guide to discovering, exploiting, and securing web application vulnerabilities.
- [Hacking: The Art of Exploitation, 2nd Edition](https://nostarch.com/hacking2.htm) - A deep dive into the techniques and concepts behind hacking and security, with a focus on coding and exploitation.
- [Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali](https://nostarch.com/linuxbasicsforhackers) - An introduction to Linux and essential hacking skills using the Kali Linux distribution.
- [CompTIA Security+ SY0-701 Certification Guide: Master Cybersecurity Fundamentals and Pass the SY0-701 Exam on Your First Attempt](https://www.amazon.com/CompTIA-Security-SY0-701-Certification-Guide/dp/1805128773) - A study guide that covers all the cybersecurity topics required to pass the Security+ certification exam.
- [Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters](https://nostarch.com/blackhatpython2e) - A book that teaches Python programming techniques for writing security tools and scripts for penetration testing.
- [Cryptography and Network Security: Principles and Practice](https://www.pearson.com/en-us/subject-catalog/p/cryptography-and-network-security-principles-and-practice/P200000004848/9780134444284) - A detailed book that explains cryptographic techniques and how they apply to network security.

### Youtube Channels

- [The Cyber Mentor](https://www.youtube.com/@TCMSecurityAcademy) - Tutorials on ethical hacking, penetration testing, and cybersecurity certifications.
- [HackerSploit](https://www.youtube.com/@HackerSploit) - Cybersecurity training focused on penetration testing and ethical hacking.
- [Ryan John](https://www.youtube.com/@ryan_phdsec) - Cybersecurity concepts, research, and practical tutorials.
- [John Hammond](https://www.youtube.com/@_JohnHammond) - CTF walkthroughs, malware analysis, and cybersecurity tips.
- [David Bombal](https://www.youtube.com/@davidbombal) - Networking and cybersecurity lessons, including certifications like Cisco and ethical hacking.
- [Network Chuck](https://www.youtube.com/@NetworkChuck) - Cybersecurity and IT tutorials, focusing on practical skills and certifications.
- [ComputerPhile](https://www.youtube.com/@Computerphile) - Videos explaining computer science topics, cybersecurity, and cryptography.
- [Ippsec](https://www.youtube.com/@ippsec) - HackTheBox walkthroughs and penetration testing strategies.
- [Hak 5](https://www.youtube.com/@hak5) - Hacking tools, techniques, and cybersecurity tips.
- [Stok](https://www.youtube.com/@STOKfredrik) - Bug bounty tips and insights for aspiring hunters.
- [Insider PhD](https://www.youtube.com/@InsiderPhD) - Bug bounty tutorials and tips for beginners in cybersecurity.
- [With Sandra](https://www.youtube.com/@WithSandra) - Cybersecurity career advice and practical hacking tutorials.
- [Unix Guy](https://www.youtube.com/@UnixGuy) - Tutorials on Linux, Unix systems, and security.

### CTF Platforms

- [picoCTF](https://picoctf.org) - A platform with fun, beginner-friendly hacking challenges for students and new learners in cybersecurity.
- [Overthewire](https://overthewire.org) - A website with games to help you learn cybersecurity and Linux by solving hands-on challenges.
- [CTFTime](https://ctftime.org) - A site that lists Capture the Flag (CTF) competitions, shows rankings, and tracks events for competitive players.
- [HackTheBox CTF](https://www.hackthebox.com) - A popular platform where you can practice hacking in realistic environments through CTF challenges and labs.
- [TryHackMe CTF](https://tryhackme.com) - An interactive platform with CTF challenges and guided lessons for people learning cybersecurity at all levels.
- [Hacker101](https://www.hacker101.com) - A free course by HackerOne that teaches hacking and web security through lessons and CTF challenges, with a focus on finding bugs.
- [RingZeroCTF](https://ringzer0ctf.com) - A platform with hacking challenges in cryptography, reverse engineering, and more to improve your skills.
- [BugCrowdCTF](https://bugcrowd.com) - A bug bounty website that sometimes runs CTF challenges to help you practice finding security flaws.
- [VulnHub](https://www.vulnhub.com) - A site where you can download vulnerable machines to practice hacking and security testing in a safe environment.
- [RootMe](https://www.root-me.org) - A platform with hundreds of hacking challenges for both beginners and experts to improve their cybersecurity skills.

## Certifications

> A list of certifications that you can take to boost your career both in the red team side or the blue team

### Red Team Certifications

- [CompTIA Pentest+](https://www.comptia.org/certifications/pentest) - A certification that validates skills in penetration testing, vulnerability assessment, and management.
- [Offensive Security Certified Professional (OSCP)](https://www.offensive-security.com/pwk-oscp/) - A hands-on certification that demonstrates practical knowledge of penetration testing methodologies and techniques.
- [Certified Ethical Hacker (CEH)](https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/) - A certification focusing on ethical hacking tools and techniques for assessing and securing systems.
- [Certified Penetration Tester (CPT)](https://iacertification.org/certified-penetration-tester-certification.html) - A certification designed to validate practical penetration testing skills and methodologies.
- [Practical Web Penetration Tester (PWPT)](https://institute.learnpentest.com/certifications/practical-web-penetration-tester/) - A certification focused on web application security, providing hands-on experience in penetration testing.
- [Certified Bug Bounty Hunter (CBBH)](https://pentesterlab.com/exercises/certified_bug_bounty_hunter) - A certification designed for individuals interested in participating in bug bounty programs and finding vulnerabilities.
- [eLearnSecurity Mobile Application Penetration Tester (eMAPT)](https://elearnsecurity.com/course/mobile-application-penetration-tester/) - A certification that focuses on assessing the security of mobile applications through practical exercises.
- [eLearnSecurity Web Application Penetration Tester eXtreme (eWPTXv2)](https://elearnsecurity.com/product/web-application-penetration-tester-extreme-ewptxv2/) - An advanced certification covering web application penetration testing techniques and strategies.
- [eLearnSecurity Junior Penetration Tester (eJPT)](https://elearnsecurity.com/product/ejpt-certification/) - An entry-level certification validating foundational knowledge and skills in penetration testing.

### Blue Team Certifications

- [CompTIA Security+](https://www.comptia.org/certifications/security) - A foundational certification covering essential security concepts and practices for IT professionals.
- [Certified Information Systems Security Professional (CISSP)](https://www.isc2.org/certifications/cissp) - A globally recognized certification validating expertise in information security management and practices.
- [Microsoft Certified: Security Operations Analyst Associate](https://learn.microsoft.com/en-us/certifications/security-operations-analyst-associate/) - A certification focused on using Microsoft security tools to detect and respond to security threats.
- [Certified Cybersecurity Analyst (CySA+)](https://www.comptia.org/certifications/cysa) - A certification that emphasizes security analytics, threat detection, and incident response.
- [Certified SOC Analyst (CSA)](https://www.eccouncil.org/programs/certified-soc-analyst-csa/) - A certification tailored for SOC roles, focusing on skills required for effective security operations.
- [Cisco Certified CyberOps Associate](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/cyberops-associate.html) - A certification providing knowledge and skills for security operations in network environments.

## Security Frameworks

- [OWASP Top Ten](https://owasp.org/www-project-top-ten/) - A widely recognized list of the ten most critical web application security risks, providing guidance on vulnerabilities and best practices for developers and security professionals.
- [OWASP ASVS (Application Security Verification Standard)](https://owasp.org/www-project-application-security-verification-standard/) - A framework for designing, developing, and testing secure web applications, providing a basis for assessing security controls.
- [CWE (Common Weakness Enumeration)](https://cwe.mitre.org/) - A community-developed list of common software and hardware weaknesses that can lead to security vulnerabilities, serving as a guide for secure coding practices.
- [SANS Top 25 Software Errors](https://www.sans.org/top25-software-errors/) - A list identifying the 25 most dangerous software errors that can lead to vulnerabilities in web applications, offering guidance for prevention.
- [ISO/IEC 27032](https://www.iso.org/standard/43733.html) - An international standard providing guidelines for cybersecurity, focusing on the protection of information in cyberspace and addressing network security considerations.
- [NIST Cybersecurity Framework](https://www.nist.gov/cyberframework) - A flexible framework that provides guidelines for managing and mitigating cybersecurity risks, including those related to network security.
- [Fortinet Security Fabric](https://www.fortinet.com/products/security-fabric) - A comprehensive cybersecurity framework designed by Fortinet, integrating various security solutions to protect network infrastructure from threats.
- [MITRE ATT&CK](https://attack.mitre.org/) - A knowledge base that provides a framework for understanding and defending against cyber adversaries, including tactics and techniques that can affect network security.

## Bug Bounties

> Some bug bounty programs where you can find vulnerabilities and get bounties for it

- [Hackerone](https://www.hackerone.com) - A leading bug bounty platform that connects businesses with ethical hackers to find and report security vulnerabilities.
- [Bugcrowd](https://www.bugcrowd.com) - A crowdsourced cybersecurity platform offering bug bounty programs to help organizations identify and fix vulnerabilities.
- [Yeswehack](https://www.yeswehack.com) - A global bug bounty platform providing opportunities for ethical hackers to find vulnerabilities in various organizations' systems.
- [Patchstack](https://patchstack.com) - A bug bounty platform focused on securing WordPress plugins and themes through vulnerability disclosure and patching.
- [Redstorm.io](https://redstorm.io) - A bug bounty platform that allows hackers to report vulnerabilities in exchange for rewards, focusing on improving cybersecurity for businesses.
- [app.cyberarmy.id](https://app.cyberarmy.id) - An Indonesian bug bounty platform connecting security researchers with companies to help them identify and resolve vulnerabilities.

## Podcasts

- [David Bombal Podcast](https://open.spotify.com/show/1DR3S0XkKRLbt3VMU0p7fW) - A podcast hosted by David Bombal, covering cybersecurity topics, networking, and tech interviews with industry experts.
- [Darknet Diaries](https://open.spotify.com/show/4XPl3uEEL9hvqMkoZrzbx5) - A storytelling podcast focused on true stories from the dark side of the internet, including hacking and cybercrime.
- [The IT Career Podcast](https://open.spotify.com/show/1Ysb7zVLdpqMZG3sRneKVF) - A podcast offering insights into IT careers, cybersecurity, and practical advice for getting started or advancing in the field.
- [Critical Thinking Bug Bounties Podcast](https://open.spotify.com/show/0rZlcnYytHBHDDIa4T8DJ9) - A podcast focusing on bug bounties, ethical hacking, and vulnerability disclosure, featuring discussions with security experts.
- [Hacker Valley Media](https://open.spotify.com/show/2KLs5TUn0SP89ohugcpVg1) - A podcast exploring various cybersecurity topics, from hacking stories to mental health in the cybersecurity industry.
- [Hack The Box Podcast](https://open.spotify.com/show/7gZfFFV5YYR8rfk0edMrzC) - The official Hack The Box podcast that discusses ethical hacking, cybersecurity challenges, and interviews with security professionals.
- [Langley Files](https://open.spotify.com/show/72dVchCyKQD5p8UYv4hwA9) - A podcast by the CIA offering a behind-the-scenes look at intelligence, cybersecurity, and national security issues.
## Tools

> A list of tools used in cyber security which includes web app pentesting, network pentesting, software security and network security

### Web Application Pentesting

#### 1. Reconnaisance

- [Recon-ng](https://github.com/lanmaster53/recon-ng) - A web reconnaissance framework that provides a powerful environment for open-source web-based reconnaissance.
- [Google Dorking](https://www.exploit-db.com/google-hacking-database) - A technique that uses advanced Google search operators to find sensitive information exposed on the web.

#### 2. Scanning & Enumeration

- [Burpsuite](https://portswigger.net/burp) - A popular web application security testing tool that includes features for scanning, crawling, and analyzing web applications.
- [OWASP ZAP](https://www.zaproxy.org/) - An open-source web application security scanner that helps find security vulnerabilities in web applications.
- [Nikto](https://github.com/sullo/nikto) - A web server scanner that performs comprehensive tests against web servers for multiple items, including outdated server software, and vulnerabilities.
- [Acunetics](https://www.acunetix.com/) - An automated web application security scanner that checks for vulnerabilities like SQL injection, XSS, and more.

#### 3. Gaining Access / Exploitation

- [SQLMap](https://sqlmap.org/) - An open-source penetration testing tool that automates the process of detecting and exploiting SQL injection vulnerabilities.
- [XSSer](https://github.com/epsylon/xsser) - a tool to exploit XSS vulnerabilities.
- [Burpsuite (Intruder)](https://portswigger.net/burp) - Besides scanning, Burp's Intruder tool can be used for brute-forcing and payload injection.
- [Hydra](https://github.com/vanhauser-thc/thc-hydra) - A popular password-cracking tool used for conducting rapid dictionary attacks against various protocols.
- [BeEF](https://beefproject.com/) - a powerful tool that can perform various tasks aimed at exploiting vulnerabilities in web browsers.

### Network Pentesting

#### 1. Reconnaisance

- [Maltego](https://www.maltego.com/) - A tool for open-source intelligence (OSINT) and forensics that can visualize relationships between data.
- [Harvester](https://github.com/laramies/theHarvester) - A tool used for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).
- [DNSRecon](https://github.com/darkoperator/dnsrecon) - A DNS reconnaissance tool that performs various DNS enumeration techniques.

#### 2. Scanning & Enumeration

- [Nmap](https://nmap.org/) - A powerful network scanner used for discovering hosts and services on a computer network.
- [Nessus](https://www.tenable.com/products/nessus) - A widely used vulnerability scanner that identifies vulnerabilities in systems and applications.
- [Wireshark](https://www.wireshark.org/) - A network protocol analyzer that captures and analyzes network traffic, useful for troubleshooting and identifying vulnerabilities.

#### 3. Gaining Access / Exploitation

- [Metasploit](https://www.metasploit.com/) - A widely used penetration testing framework that includes a range of exploits and payloads to gain access to systems.
- [Hydra](https://github.com/vanhauser-thc/thc-hydra) - A fast network logon cracker that supports numerous protocols for password guessing.
- [Aircrack-ng](https://www.aircrack-ng.org/) - A suite of tools for assessing Wi-Fi network security, including capturing packets and cracking WEP/WPA/WPA2 keys.

#### 4. Maintaining Access

- [Netcat](https://nmap.org/ncat/) - A networking utility that can create TCP/UDP connections and is often used for creating backdoors.
- [Meterpreter](https://docs.metasploit.com/docs/using-metasploit/advanced/meterpreter/meterpreter.html) - A payload within Metasploit that allows for post-exploitation, providing a command shell and extensive features for maintaining access.
- [Empire](https://www.alpinesecurity.com/blog/empire-a-powershell-post-exploitation-tool/) - A post-exploitation framework that uses PowerShell agents for persistence and control.
- [Cobalt Strike](https://www.cobaltstrike.com/) - A commercial penetration testing tool that provides advanced features for post-exploitation and persistence.
- [RATs (Remote Access Trojans)](https://www.techtarget.com/searchsecurity/definition/RAT-remote-access-Trojan) - Tools like DarkComet or NjRAT allow attackers to maintain remote control over compromised systems.

#### 5. Clearing Tracks

- [CCleaner](https://www.ccleaner.com) - A tool used to remove unnecessary files and clear logs to cover tracks after an attack.
- [Metasploit (Clearing Logs / Post Exploitation Modules)](https://www.metasploit.com/) - Metasploit's post-exploitation modules can assist in clearing logs and covering tracks.
- [Timestomp](https://viperone.gitbook.io/pentest-everything/everything/everything-active-directory/defense-evasion/indicator-removal/timestomp) - A tool that allows users to modify file timestamps to obscure evidence of access or modification.
- [Sysinternals Suite](https://learn.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite) - A collection of utilities (like PsExec) that can help manage and hide processes, as well as clear logs.
- [Rootkits](https://www.kaspersky.com/resource-center/definitions/what-is-rootkit) - Though illegal and unethical for legitimate pentesting, rootkits can hide files and processes from detection.

### Software Security

- [Microsoft Threat Modelling Tool](https://learn.microsoft.com/en-us/security/engineering/threat-modeling-tool) - A tool that helps identify and address security threats early in the software development process by creating threat models.
- [SonarQube](https://www.sonarqube.org/) - An open-source platform that automatically inspects code quality and security vulnerabilities during development.
- [Semgrep](https://semgrep.dev/) - A fast and customizable static analysis tool for finding security vulnerabilities and enforcing code standards.
- [ZAP-Cli](https://github.com/Grunny/zap-cli) - A command-line interface for OWASP ZAP that automates web application security scanning and testing.

### Network Security

#### Malware Analysis

- [Detect It Easy (DIE)](https://ntinfo.biz/index.html) - A tool for identifying and analyzing file formats and executable packers to help with reverse engineering.
- [Ghidra](https://ghidra-sre.org/) - An open-source software reverse engineering tool developed by the NSA, providing powerful decompilation and analysis capabilities.
- [IDA Pro](https://hex-rays.com/ida-pro/) - A widely used disassembler and debugger for reverse engineering applications and malware analysis.
- [Radare 2](https://rada.re/n/) - A free and open-source reverse engineering framework offering disassembly, debugging, and binary analysis features.
- [JADX](https://github.com/skylot/jadx) - A decompiler for Android applications, converting APK files back into readable Java source code.
- [Any Run](https://any.run/) - An interactive online malware analysis service that allows users to run and analyze malicious files in real time.
- [Triage](https://tria.ge/) - A cloud-based automated malware analysis platform designed for quick and efficient analysis of suspicious files.
- [Cuckoo Sandbox](https://cuckoosandbox.org/) - An open-source automated malware analysis system that runs suspicious files in an isolated environment to observe behavior.

#### Intrusion Detection / Prevention System (IDS / IPS)

- [Snort](https://www.snort.org/) - An open-source intrusion detection and prevention system (IDS/IPS) capable of real-time traffic analysis and packet logging.
- [Suricata](https://suricata.io/) - A high-performance, open-source IDS, IPS, and network security monitoring engine that can handle multi-threaded traffic analysis.
- [OSSEC](https://www.ossec.net/) - An open-source host-based intrusion detection system (HIDS) that monitors logs, detects anomalies, and provides real-time alerting.
- [Zeek](https://zeek.org/) - A network security monitoring tool that analyzes traffic and provides deep inspection and logging of network activity.
- [Security Onion](https://securityonion.net/) - A free and open-source Linux distribution for intrusion detection, network security monitoring, and log management.

#### Honeypots

- [Dionaea](https://github.com/DinoTools/dionaea) - A low-interaction honeypot designed to capture malware and network attacks by emulating vulnerable services.
- [Glastopf](https://github.com/mushorg/glastopf) - A web application honeypot that emulates vulnerable websites to gather information on web-based attacks.
- [Cowrie](https://github.com/cowrie/cowrie) - A medium-interaction SSH and Telnet honeypot designed to log brute-force attacks and shell commands.
- [Kippo](https://github.com/desaster/kippo) - A medium-interaction SSH honeypot focused on logging brute-force login attempts and simulating an interactive shell.
- [Laravel application honeypot](https://github.com/haruncpi/laravel-honeypot) - A honeypot package for Laravel applications to protect against automated form submissions and spam.
- [Wordpress honeypots](https://github.com/orthros/dorknet) - Honeypot setups specifically designed to capture attacks targeting vulnerabilities in WordPress installations.
- [Honeyd](http://www.honeyd.org/) - A versatile low-interaction honeypot that simulates various network services and hosts to detect and log network activity.
- [Mongodb honeypot proxy](https://github.com/chrislockard/mongo_honeypot) - A honeypot proxy that simulates MongoDB servers to capture and analyze malicious activity targeting exposed databases.

#### SIEM

- [Wazuh](https://wazuh.com/) - An open-source security monitoring platform that offers SIEM, intrusion detection, and compliance management.
- [Splunk](https://www.splunk.com/) - A powerful SIEM solution that collects, analyzes, and visualizes machine data in real-time for security monitoring and analytics.
- [IBM Security QRadar](https://www.ibm.com/products/qradar-siem) - An enterprise-level SIEM that helps detect, analyze, and respond to security threats across the network.
- [Rapid7 InsightIDR](https://www.rapid7.com/products/insightidr/) - A cloud-based SIEM tool that focuses on detecting intrusions, investigating security incidents, and automating responses.
- [Fortinet FortiSIEM](https://www.fortinet.com/products/siem/fortisiem) - A comprehensive SIEM that combines real-time monitoring, event correlation, and performance management.
- [SolarWinds Security Event Manager](https://www.solarwinds.com/security-event-manager) - A SIEM solution that provides automated threat detection, event correlation, and incident response capabilities.

## Misc

> Varied resources in a plethora of topics

### More Awesome Repos (actively maintained)

- [the-book-of-secret-knowledge](https://github.com/trimstray/the-book-of-secret-knowledge?tab=readme-ov-file#your-daily-knowledge-and-news-toc) - A huge collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
- [awesome-threat-intelligence](https://github.com/hslatman/awesome-threat-intelligence) - A curated list of Awesome Threat Intelligence resources.
- [awesome-osint](https://github.com/jivoi/awesome-osint) - A curated list of amazingly awesome Open-Source Intelligence.
- [awesome-cyber-skills](https://github.com/joe-shenouda/awesome-cyber-skills) - A curated list of hacking environments where you can train your cyber skills.