An open API service indexing awesome lists of open source software.

Cybersecurity

Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.

https://github.com/chaitin/safeline

SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.

api-gateway application-security appsec blueteam bruteforce captcha cve cybersecurity firewall hackers http-flood security self-hosted sql-injection vulnerability waf web-application-firewall web-security websecurity xss

Last synced: 06 May 2025

https://github.com/chaitin/SafeLine

SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.

api-gateway application-security appsec blueteam bruteforce captcha cve cybersecurity firewall hackers http-flood security self-hosted sql-injection vulnerability waf web-application-firewall web-security websecurity xss

Last synced: 25 Mar 2025

https://github.com/swe-agent/swe-agent

SWE-agent takes a GitHub issue and tries to automatically fix it, using your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges. [NeurIPS 2024]

agent agent-based-model ai cybersecurity developer-tools llm lms

Last synced: 06 May 2025

https://github.com/princeton-nlp/SWE-agent

[NeurIPS 2024] SWE-agent takes a GitHub issue and tries to automatically fix it, using GPT-4, or your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges.

agent agent-based-model ai cybersecurity developer-tools llm lms

Last synced: 01 Apr 2025

https://github.com/SWE-agent/SWE-agent

[NeurIPS 2024] SWE-agent takes a GitHub issue and tries to automatically fix it, using GPT-4, or your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges.

agent agent-based-model ai cybersecurity developer-tools llm lms

Last synced: 10 Dec 2024

https://princeton-nlp.github.io/SWE-agent

[NeurIPS 2024] SWE-agent takes a GitHub issue and tries to automatically fix it, using GPT-4, or your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges.

agent agent-based-model ai cybersecurity developer-tools llm lms

Last synced: 06 Jan 2025

https://github.com/princeton-nlp/swe-agent

[NeurIPS 2024] SWE-agent takes a GitHub issue and tries to automatically fix it, using GPT-4, or your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges.

agent agent-based-model ai cybersecurity developer-tools llm lms

Last synced: 02 Dec 2024

https://github.com/opennhp/opennhp

A lightweight, cryptography-powered, open-source toolkit built to enforce Zero Trust security for infrastructure, applications, and data in the AI-driven world.

cybersecurity zero-trust zero-trust-network-access zero-trust-security

Last synced: 06 May 2025

https://github.com/OpenNHP/opennhp

NHP: A lightweight cryptography-driven Zero Trust networking protocol at the OSI 5th layer to hide your server and data from attackers.

cybersecurity zero-trust zero-trust-network-access zero-trust-security

Last synced: 10 Mar 2025

https://github.com/mytechnotalent/reverse-engineering

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.

arm assembly assembly-language assembly-language-programming avr c c-plus-plus cyber-security cybersecurity go golang hacking malware reverse-engineering reverse-engineering-tutorial risc-v riscv rust x64 x86

Last synced: 12 May 2025

https://github.com/mytechnotalent/Reverse-Engineering

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM and embedded RISC-V architectures.

arm arm-assembly assembly assembly-language assembly-language-programming c c-plus-plus cyber-security cybersecurity go golang hacking malware reverse-engineering reverse-engineering-tutorial risc-v riscv rust x64 x86

Last synced: 15 Mar 2025

https://github.com/trimstray/test-your-sysadmin-skills

A collection of Linux Sysadmin Test Questions and Answers. Test your knowledge and skills in different fields with these Q/A.

answers bsd cheatsheets cybersecurity databases devops exam interview interview-questions knowledge linux network resources security skills sysadmin sysops systems unix webops

Last synced: 08 May 2025

https://github.com/projectdiscovery/httpx

httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.

bugbounty cli cybersecurity hacktoberfest http lib osint pentest-tool pipeline ssl-certificate

Last synced: 12 May 2025

https://github.com/berty/berty

Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network

android berty censorship crdt cybersecurity encryption gomobile ios ipfs libp2p messaging mobile-app monorepo offline-first orbitdb p2p privacy react-native surveillance

Last synced: 06 May 2025

https://github.com/bee-san/pywhat

🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙‍♀️

cyber cybersecurity hacking hacktoberfest malware malware-analysis malware-research pcap python re security tryhackme

Last synced: 27 Apr 2025

https://github.com/bee-san/pyWhat

🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙‍♀️

cyber cybersecurity hacking hacktoberfest malware malware-analysis malware-research pcap python re security tryhackme

Last synced: 17 Mar 2025

https://github.com/opencti-platform/opencti

Open Cyber Threat Intelligence Platform

cti cyber cybersecurity intelligence osint security threat-intelligence

Last synced: 02 Apr 2025

https://github.com/OpenCTI-Platform/opencti

Open Cyber Threat Intelligence Platform

cti cyber cybersecurity intelligence osint security threat-intelligence

Last synced: 30 Mar 2025

https://github.com/ihebski/DefaultCreds-cheat-sheet

One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️

blueteam bugbounty cheatsheet credentials-gathering cybersecurity default-password exploit infosec offensive-security pentest pentesting

Last synced: 02 Apr 2025

https://github.com/ihebski/defaultcreds-cheat-sheet

One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️

blueteam bugbounty cheatsheet credentials-gathering cybersecurity default-password exploit infosec offensive-security pentest pentesting

Last synced: 25 Mar 2025

https://github.com/farhanashrafdev/90DaysOfCyberSecurity

This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md

communityexchange cybersecurity ethical-hacking hacktoberfest learn

Last synced: 09 Dec 2024

https://github.com/gnuradio/gnuradio

GNU Radio – the Free and Open Software Radio Ecosystem

c-plus-plus cybersecurity dsp gnu gnuradio hacktoberfest python radio sdr wireless

Last synced: 07 May 2025

https://github.com/oisf/suricata

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.

cybersecurity ids intrusion-detection-system intrusion-prevention-system ips network-monitor network-monitoring nsm security suricata threat-hunting

Last synced: 22 Apr 2025

https://github.com/azure/azure-sentinel

Cloud-native SIEM for intelligent security analytics for your entire enterprise.

cybersecurity sample-code

Last synced: 12 May 2025

https://github.com/Azure/Azure-Sentinel

Cloud-native SIEM for intelligent security analytics for your entire enterprise.

cybersecurity sample-code

Last synced: 15 Apr 2025

https://github.com/jassics/security-study-plan

Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...

api-security application-security appsec appsec-tutorials aws-security azure-security cybersecurity cybersecurity-education devsecops-university gcp-security infosec pentesting security-testing study-guide study-plan study-planner

Last synced: 27 Mar 2025

https://github.com/meitar/awesome-cybersecurity-blueteam

:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.

awesome-list blue-team computer-security cybersecurity defensive-security infosec security

Last synced: 23 Feb 2025

https://github.com/OISF/suricata

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.

cybersecurity ids intrusion-detection-system intrusion-prevention-system ips network-monitor network-monitoring nsm security suricata threat-hunting

Last synced: 14 Mar 2025

https://github.com/ntop/ndpi

Open Source Deep Packet Inspection Software Toolkit

cybersecurity deep-packet-inspection dpi ndpi network traffic-analysis

Last synced: 24 Apr 2025

https://github.com/t3l3machus/villain

Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).

c2 cybersecurity hacking hacking-tool offensive-security open-source penetration-testing penetration-testing-tools pentest pentesting readteaming redteam redteam-tools

Last synced: 28 Apr 2025

https://github.com/ntop/nDPI

Open Source Deep Packet Inspection Software Toolkit

cybersecurity deep-packet-inspection dpi ndpi network traffic-analysis

Last synced: 13 Mar 2025

https://github.com/t3l3machus/Villain

Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).

c2 cybersecurity hacking hacking-tool offensive-security open-source penetration-testing penetration-testing-tools pentest pentesting readteaming redteam redteam-tools

Last synced: 30 Mar 2025

https://github.com/foospidy/payloads

Git All the Payloads! A collection of web attack payloads.

appsec cybersecurity hacking passwords payload payloads pentest sqli web-attack-payloads xss

Last synced: 13 Apr 2025

https://github.com/i5ik/Viewfinder

🌀 Browse the whole web from a web page. Remote browser isolation. For compliance, integration, security, privacy and more! By https://dosyago.com

browser cdr chrome cobrowsing cybersecurity embeddable hidden-services multiplayer onion-service proxy-server rbi remote-browser-isolation remote-browsers reverse-proxy sanitization tor web-browser web-isolation webrtc zero-trust

Last synced: 07 Feb 2025

https://github.com/FeeiCN/Security-PPT

Security-related Slide Presentation & Security Research Report(大安全各领域各公司各会议分享的PPT以及各类安全研究报告)

cybersecurity ppt presentation presentation-slides security security-ppt security-report

Last synced: 12 Mar 2025

https://github.com/feeicn/security-ppt

Security-related Slide Presentation & Security Research Report(大安全各领域各公司各会议分享的PPT以及各类安全研究报告)

cybersecurity ppt presentation presentation-slides security security-ppt security-report

Last synced: 17 Jan 2025

https://github.com/p1ngul1n0/blackbird

An OSINT tool to search for accounts by username and email in social networks.

cybersecurity osint pentesting python

Last synced: 23 Apr 2025

https://github.com/alexandreborges/malwoverview

Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest, VxExchange and IPInfo, and it is also able to scan Android devices against VT.

alienvault cybersecurity malpedia malshare malware malware-analysis malwarebazaar threat-hunting threatfox threathunting threatintelligence triage urlhaus virustotal

Last synced: 08 May 2025

https://github.com/rtcatc/packer-fuzzer

Packer Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.

cybersecurity fuzzing hacking python3 scanner webpack

Last synced: 06 Apr 2025

https://github.com/rtcatc/Packer-Fuzzer

Packer Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.

cybersecurity fuzzing hacking python3 scanner webpack

Last synced: 18 Apr 2025

https://github.com/cisagov/RedEye

RedEye is a visual analytic tool supporting Red & Blue Team operations

blue-team cybersecurity red-team

Last synced: 27 Mar 2025

https://github.com/cisagov/redeye

RedEye is a visual analytic tool supporting Red & Blue Team operations

blue-team cybersecurity red-team

Last synced: 19 Jan 2025

https://github.com/tracecathq/tracecat

The open source Tines / Splunk SOAR alternative for security and IT engineers. Built on simple YAML templates for integrations and response-as-code.

automation cybersecurity event-driven fastapi incident-response llm low-code monitoring nextjs openapi orchestration pydantic security temporalio workflow-engine

Last synced: 10 Apr 2025

https://github.com/TracecatHQ/tracecat

The open source Tines / Splunk SOAR alternative for security and IT engineers. Built on simple YAML templates for integrations and response-as-code.

automation cybersecurity event-driven fastapi incident-response llm low-code monitoring nextjs openapi orchestration pydantic security temporalio workflow-engine

Last synced: 24 Mar 2025

https://github.com/blackorbird/apt_report

Interesting APT Report Collection And Some Special IOC

apt cybersecurity malware security threat-hunting

Last synced: 10 Apr 2025

https://github.com/blackorbird/APT_REPORT

Interesting APT Report Collection And Some Special IOC

apt cybersecurity malware security threat-hunting

Last synced: 10 Apr 2025

https://github.com/thewhiteh4t/nexfil

OSINT tool for finding profiles by username

cybersecurity fast open-source-intelligence osint python username

Last synced: 13 Apr 2025

https://github.com/Yamato-Security/hayabusa

Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.

attack cybersecurity detection dfir event forensics hayabusa hunting incident incident-response logs response rust security security-automation sigma threat threat-hunting windows yamato

Last synced: 02 Apr 2025

https://github.com/bhavsec/reconspider

🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.

automated cybersecurity framework hacking information-gathering osint pentest pentesting python recon reconnaissance scanner security

Last synced: 27 Mar 2025

https://github.com/EONRaider/blackhat-python3

Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

blackhat-python blackhat-python-source-code cybersecurity ethical-hacking hacking-tools network-programming network-security python-hacking

Last synced: 14 Apr 2025

https://github.com/eonraider/blackhat-python3

Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

blackhat-python blackhat-python-source-code cybersecurity ethical-hacking hacking-tools network-programming network-security python-hacking

Last synced: 11 Apr 2025

https://github.com/aress31/burpgpt

A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities and enables running traffic-based analysis of any type.

ai burp-extensions burp-plugin burpsuite burpsuite-extender cybersecurity gpt gpt-3 openai openai-api pentesting security security-automation webapp

Last synced: 11 Apr 2025

https://github.com/mitre-attack/attack-navigator

Web app that provides basic navigation and annotation of ATT&CK matrices

cti cyber-threat-intelligence cybersecurity mitre-attack mitre-corporation

Last synced: 10 Apr 2025

https://mitre-attack.github.io/attack-navigator/

Web app that provides basic navigation and annotation of ATT&CK matrices

cti cyber-threat-intelligence cybersecurity mitre-attack mitre-corporation

Last synced: 10 Apr 2025

https://github.com/cisagov/malcolm

Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.

arkime cybersecurity infosec network-security network-traffic-analysis networksecurity networktrafficanalysis opensearch opensearch-dashboards pcap security suricata zeek

Last synced: 11 Apr 2025

https://github.com/cisagov/Malcolm

Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.

arkime cybersecurity infosec network-security network-traffic-analysis networksecurity networktrafficanalysis opensearch opensearch-dashboards pcap security suricata zeek

Last synced: 30 Mar 2025

https://github.com/zhzyker/dismap

Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点

cybersecurity detection fingerprint fingerprint-scanner golang-tools identification pentest-tool pentest-tools redteam redteam-tools security security-scan security-tools webscan

Last synced: 14 Apr 2025

https://github.com/megamansec/ssh-snake

SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.

bash cybersecurity exploitation exploitation-tool hacking hacking-tools pentesting post-exploitation redteam scanner security security-tools shell ssh ssh-hacking vulnerability-scanner worm

Last synced: 12 Apr 2025

https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries

Sample queries for Advanced hunting in Microsoft 365 Defender

cybersecurity hunting sample-code

Last synced: 15 Apr 2025

https://github.com/microsoft/microsoft-365-defender-hunting-queries

Sample queries for Advanced hunting in Microsoft 365 Defender

cybersecurity hunting sample-code

Last synced: 17 Jan 2025

https://github.com/idov31/nidhogg

Nidhogg is an all-in-one simple to use windows kernel rootkit.

cpp cyber-security cybersecurity driver infosec kernel red-team redteam rootkit windows windows-rootkits

Last synced: 11 Apr 2025

https://github.com/center-for-threat-informed-defense/adversary_emulation_library

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

adversary-emulation adversary-emulation-plans ctid cyber-threat-intelligence cybersecurity mitre-attack red-team threat-informed-defense

Last synced: 14 Apr 2025

https://github.com/someengineering/fixinventory

Fix Inventory helps you identify and remove the most critical risks in AWS, GCP, Azure and Kubernetes.

aws cnapp cspm cybersecurity digitalocean gcp infrastructure-as-code policy-as-code security security-audit security-automation

Last synced: 10 Apr 2025