An open API service indexing awesome lists of open source software.

Cybersecurity

Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.

https://github.com/devxprite/httpfy

A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, response-time , server, content-type and many other

cybersecurity hacking http infosec kali-tools nodejs npm open-source osint osint-tool termux-tool

Last synced: 16 Mar 2025

https://github.com/kartikmehta8/pykeylogger

A Python-based Keylogger that can track your keystrokes, clipboard text, take screenshots at regular intervals, and records audio. It sends the data as SMS to the target phone number using Twilio.

cybersecurity keylogger-python keylogging python security-tools twilio

Last synced: 13 Apr 2025

https://github.com/ait-aecid/logdata-anomaly-miner

This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.

anomaly anomaly-detection cybersecurity detection hids ids intrusion-detection linux log-analysis logdata logging python security

Last synced: 10 Apr 2025

https://github.com/paulveillard/cybersecurity-forensics

A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity

cybersecurity digital-forensics forensic-analysis forensics forensics-101 forensics-investigations forensics-tools free open-data open-discovery open-source

Last synced: 28 Mar 2025

https://github.com/mitre/engage

MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.

active-defense cyber-deception cyberdefense cybersecurity deception mitre mitre-attack mitre-corporation

Last synced: 23 Feb 2025

https://github.com/kabilan1290/grapX

grapX will iterate through the URLs and grep the endpoints with all possible extensions.

automation bugbounty bugbounty-tool bugbountytips cybersecurity opensource python python-script security-automation security-vulnerability

Last synced: 21 Nov 2024

https://github.com/tasooshi/exfilkit

Data exfiltration utility for testing detection capabilities

cti cybersecurity data-exfiltration exfiltration pentesting red-team security-tools

Last synced: 21 Nov 2024

https://github.com/paulveillard/cybersecurity-devsecops

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about DevSecOps in Cybersecurity.

cybersecurity cybersecurity-education devops devsecops secops security-automation security-by-design security-compliance security-development security-education security-enablement security-engineering security-lab security-management security-tools security-vulnerability

Last synced: 10 Apr 2025

https://github.com/naemazam/encryptxpert

EncryptXpert is an app for easy file encryption/decryption using AES-EAX or AES-GCM algorithms. With GUI & CLI support and Build-in Key Database System, it's secure 🔒 & versatile across Windows and Linux.

cryptography cryptography-project cryptography-tools cybersecurity cybersecurity-tools naemazam

Last synced: 11 Apr 2025

https://github.com/t3l3machus/aceshark

ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating the need for tools like accesschk.exe or other non-native binaries.

cybersecurity hacking hacking-tool pentest pentest-tool redteam

Last synced: 29 Apr 2025

https://github.com/sexettin78/sexettintool

İçerisinde her biri özenle yazılmış, 80'den fazla siber güvenlik aracı bulunan kapsamlı bir siber güvenlik aracı.

ai cyber-security cybersecurity esp-32 esp8266 hack hacking-tool hacking-tools malware-development osint osint-tool payload pentest pentest-tool phishing raspberry-pi-pico turkish wifi-hacking wifi-pentesting

Last synced: 17 Feb 2025

https://github.com/cyb3rko/pazzword

The most intelligent password evaluator app

analyzer android app cybersecurity evaluation kotlin nbvcxz password zxcvbn

Last synced: 17 Jan 2025

https://github.com/lisa-analyzer/lisa

📚 a modular easy to use Library for Static Analysis aiming at multi-language analysis

abstract-interpretation analysis analyzer cybersecurity formal-methods java lisa program-verification static-analysis static-analyzer static-analyzers

Last synced: 27 Feb 2025

https://github.com/center-for-threat-informed-defense/cloud-analytics

Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as well as a blueprint for how others can create and use cloud analytics effectively.

analytics cloud cloud-computing ctid cyber-analytics cyber-threat-intelligence cybersecurity mitre-attack

Last synced: 19 Feb 2025

https://github.com/aw-junaid/computer-science

Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emerging technologies. Ideal for learners and enthusiasts looking to enhance their knowledge and skills in the field

algorithms assembly-language automata computer-architecture computer-networks computer-science computer-vision cpp cybersecurity data-science data-science-projects data-structures database game-development machine-learning networking operating-system python

Last synced: 26 Mar 2025

https://github.com/akshay-vs/passlock

PassLock is a medium-security password manager that encrypts passwords using Advanced Encryption Standards (AES)

aes aes-encryption console-application cybersecurity encryption password-manager python random-password-generator terminal-graphics

Last synced: 28 Nov 2024

https://github.com/gamemann/the-dpdk-examples

Program examples utilizing the DPDK. The DPDK is a kernel-bypass network library that allows for very fast network packet processing. This is great for (D)DoS mitigation and low-latency packet inspection, manipulation, and forwarding.

cyber cyber-security cybersecurity data-plane dpdk dpdk-code dpdk-examples drop fast firewall intel low-level networking packet processing security stats udp

Last synced: 18 Mar 2025

https://github.com/chichou/grab.js

simple TCP banner grabbing with node.js

cybersecurity nmap port-scanner security

Last synced: 14 Apr 2025

https://github.com/leeyangee/pylineshell

基于Python3的Shell Payload库,针对于渗透测试中拿到exec、pickle等命令执行点后不落地内存加载Py代码、无落地直接运行Py项目、无回显不出网等场景

cyber-security cybersecurity penetration-testing pentest-tool pentesting python python3 script shellcode

Last synced: 15 Apr 2025

https://github.com/nu11pointer/fuzzlists

A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc

bruteforce bugbounty cybersecurity dictionaries infosec pentesting wordlists

Last synced: 05 Apr 2025

https://github.com/clats97/clatscracker

ClatsCracker is a versatile Python password-cracking tool supporting 25 hash algorithms. It offers dictionary or brute-force attacks, adjustable threads, salted hash verification, a user-friendly menu, and progress feedback—ensuring, efficient, ethical password testing. This project was peer reviewed by a CompTIA Security+ certified person.

blueteam bruteforce cryptography cybersecurity dictionaryattack ethicalhacking hashcracking hashfunctions hashing infosec md5 password passwordcracking penetrationtesting pentesting redteam securepasswords sha256 trending trending-repositories

Last synced: 24 Apr 2025

https://github.com/probiusofficial/cybersecurity-startguide

针对0基础新手编写的网络安全入门指南

cybersecurity cybersecurity-education guide

Last synced: 26 Feb 2025

https://github.com/phantom0004/morpheus_ioc_scanner

Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies Indicators of Compromise with unmatched precision across diverse formats, redefining cybersecurity defense.

analysis blue-team-tool blue-teaming-tools cyber-analysis-tools cybersecurity ioc python3 scanner yara yara-rules

Last synced: 19 Apr 2025

https://github.com/center-for-threat-informed-defense/sensor-mappings-to-attack

Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help detect real-world adversary behaviors in their environments.

ctid cyber-defense cyber-tools cybersecurity mitre-attack threat-informed-defense

Last synced: 12 Apr 2025

https://github.com/macmod/stars

A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services that could possibly lead to subdomain takeover scenarios.

aws azure cloud cloudflare cybersecurity digitalocean dns domain-takeover gcp infosec pentesting python python3 scanner security security-research security-tools subdomain subdomain-takeover takeover

Last synced: 14 Apr 2025

https://github.com/OsbornePro/BTPS-SecPack

This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding available to overly spend on security. The goal of this project is to help add value to an smaller organizations security by creating more visibility for the average IT Administrator. Organizations with 1,000’s of devices may find that this entire suite does not apply to them.

active-directory alert alerting alerts blueteam cmdlets cybersecurity defense defense-in-depth microsoft powershell protections ps1 security security-tools smaller-organizations wef windowseventforwarding windowsevents winrm

Last synced: 21 Nov 2024

https://github.com/rahulrajpl/netizenship

a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.

cybersecurity information-gathering information-retrieval information-security infosec osint-python websec websecurity

Last synced: 05 May 2025

https://github.com/center-for-threat-informed-defense/technique-inference-engine

TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.

ctid cyber-threat-intelligence cybersecurity machine-learning mitre-attack threat-informed-dense

Last synced: 12 Apr 2025

https://github.com/itboxltda/pentestlab

Script to manage and create local pentesting training virtual lab

cybersecurity cybersecurity-training-lab laboratory-automation owasp pentesting-resources security-testing

Last synced: 21 Nov 2024

https://github.com/rosesecurity/simatic-smackdown

A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to target multiple operating systems out of the box, SIMATIC-SMACKDOWN enumerates networks for S7 devices before launching a distributed attack to STOP PLC CPUs.

cybersecurity go golang malware-research malware-samples

Last synced: 19 Dec 2024

https://github.com/emrekybs/draculaos

Dracula OS is a Linux operating system meticulously designed for OSINT (Open Source Intelligence) and Cyber ​​Intelligence missions.

cybersecurity dracula-theme intelligence kali-linux offensive-security osint osint-tool

Last synced: 12 Mar 2025

https://github.com/irishmaestro/fubar

Formidable Unix Binary Arsenal & Repository. TUI built for offline payload generation, retrieval, and exfiltration.

binaries cli ctf ctf-tools cybersecurity fubar gtfobins hackthebox linux privesc tui tui-rs

Last synced: 31 Mar 2025

https://github.com/wravoc/harden-freebsd

Updated for 14.0. A half days worth of work can be done in seconds, with comprehensive logging, togglable secure/performance settings, and backups. Implements a broad, time-tested, thoroughly researched, cohesive group of hardening settings for FreeBSD. Any directive can be set, re-set, for administering, tuning, jails. Verify in /vendor.

bsd cybersecurity freebsd kernel risk-management security security-hardening

Last synced: 06 Apr 2025

https://github.com/cipher387/cipher387.github.io

Repo for site with links to my projects

cybersecurity geoint osint socmint

Last synced: 11 Mar 2025

https://github.com/blackstork-io/fabric

An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as-Code

compliance compliance-reporting cti cybersecurity pentesting reporting secops security-reporting

Last synced: 08 Feb 2025

https://github.com/yogsec/OneLinerBounty

OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their skills and efficiency. Contribute your own tips or use these to streamline your workflow and uncover more vulnerabilities. #BugBounty #Cybersecurity #HackTips #SecurityResearch #OneLinerBugBounty #OneLinerBounty

bug bugbounty bugbountytips burp-extensions burpsuite cyber-security cybersecurity cybersecurity-tools cybersecuritytips ethicalhacking hacker hackerone hackers hacking hacking-tools nmap onelinerbugbounty osint owasp

Last synced: 01 Apr 2025

https://github.com/fedml-ai/fediot

Federated Learning for Internet of Things: A Federated Learning Framework for On-device Anomaly Data Detection, backed by FedML, Inc.

anomaly-detection autoencoder cybersecurity federated-learning iot iot-application machine-learning pytorch raspberry-pi

Last synced: 22 Apr 2025

https://github.com/boitatech/cyber-security-roadmap

O repositório Cyber Security Roadmap é uma iniciativa para ajudar a comunidade de segurança da informação a se orientar sobre o que estudar.

boitatech cyber-security cybersecurity infosec roadmad security

Last synced: 25 Jan 2025

https://github.com/gunjan5/container-security

Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides

checklist cloud containers cybersecurity docker kubernetes security

Last synced: 17 Dec 2024

https://github.com/thearrival/IsmailScript

Is a tool written by using python programming language. Enable a penetration testers to save a time and performing a full Reconnaissance and Information Gathering on any Web Application Server.

bs4 cybersecurity dns dns-server information-gathering ip ismailscript nmap penetration-testers portscanner python python3 reconnaissance reconnaissance-framework requests serverbanner serverscan socket webapplication whois

Last synced: 01 May 2025

https://github.com/pzaino/thecrowler

A Content Discovery and Development Platform. Empowering Cybersecurity, AI, Marketing, and Finance professionals and researchers to discover, analyze, and interact with the web in all its dimensions.

automation content-detection content-discovery crawler crawling cyber-security cybersecurity cybersecurity-tools golang indexer indexing reconnaissance scraping search-engine vulnerability-detection

Last synced: 03 Dec 2024

https://github.com/shaik-sohail-72/network-intrusion-detection-using-deep-learning

Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web I/O System.

classification cybersecurity deep-learning detect-anomalies knn machine-learning mern-stack mongodb network network-intrusion-detection nids nodejs nsl-kdd reactjs rnn-model tensorflow

Last synced: 12 Apr 2025

https://github.com/domaintools/domaincat

Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations

analysis cybersecurity graph jupyter-notebook threat-hunting

Last synced: 12 Apr 2025

https://github.com/paulveillard/cybersecurity-blue-team

A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team in Cybersecurity.

blue blue-team cyber-threat-intelligence cybernetics cybersecurity vulnerabilities vulnerability-identification vulnerability-management vulnerability-research vulnerability-scanners vulnerability-scanning

Last synced: 28 Mar 2025

https://github.com/paulveillard/cybersecurity-threat-detection

An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Detection & Hunting.

cybersecurity encryption-decryption malware-analysis malware-detection malware-development security-tools security-vulnerability threat-analysis threat-blocker threat-detection threat-detection-policy threat-explorer threat-hunting threat-intelligence threat-modeling threat-monitor threat-response

Last synced: 28 Mar 2025

https://github.com/paulveillard/cybersecurity-threat-intelligence

An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.

cyberattack cybersecurity cyberthreatintelligence dashboard intel maps security threat-detection-policy threat-hunting threat-intelligence threat-intelligence-data threat-intelligence-database threat-intelligence-platform threat-response

Last synced: 28 Mar 2025

https://github.com/cifertech/arpolan

A tool for network scanning and ARP spoofing using the Atmega32u4 and W5500

atmega32u4 cybersecurity ethernet hacktoberfest w5500

Last synced: 14 Feb 2025

https://github.com/whxitte/gixposed

Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens. Its purpose is to help developers and security professionals quickly identify and remediate exposed sensitive informations in their codebases.

api-key automation code-analysis credentials cybersecurity cybersecurity-tools devsecops exposure git gitxposed-tool gixposed gixposed-github opensource scanning search secret-management secrets security vulnerability-detection

Last synced: 28 Apr 2025

https://github.com/WillOram/cyber-incident-management

Notes on managing and coordinating the response to major cyber incidents

crisis-management cybersecurity incident-management incident-response security

Last synced: 21 Nov 2024

https://github.com/idov31/nidhoggscript

NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg

cpp cyber-security cybersecurity driver infosec kernel red-team redteam rootkit windows windows-rootkits

Last synced: 20 Nov 2024

https://github.com/elniak/panther

This tool presents a novel approach to bolstering network protocol verification by integrating the Shadow network simulator with the Ivy formal verification tool to check time properties. Furthermore, it extends Ivy’s capabilities with a dedicated time module, enabling the verification of complex quantitative-time properties.

cve cybersecurity docker docker-compose formal-methods formal-verification ivy network-analysis network-security network-simulator protocol protocol-tester quic reproducible-research test-automation testing testing-tools tests time-proof transport-layer-protocol

Last synced: 30 Apr 2025

https://github.com/k8sstormcenter/honeycluster

Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - for kind (and GKE, RKE2, AKS)

cloudnative cybersecurity ebpf kubernetes threat-intelligence

Last synced: 10 Apr 2025

https://github.com/jmousqueton/github-cve-monitor

Github action for monitoring CVE

cve cybersecurity github-actions python

Last synced: 24 Apr 2025

https://github.com/misp/misp-compliance

Legal, procedural and policies document templates for operating MISP and information sharing communities

cybersecurity gdpr information-exchange information-sharing legal misp

Last synced: 08 May 2025

https://github.com/ph4ntonn/Behold3r

👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱

cybersecurity information pentest-tool pentesting python redis redteam security-tools subdomain subdomain-scanner

Last synced: 21 Nov 2024

https://github.com/jailbreakme-xyz/jailbreak

jailbreakme.xyz is an open-source decentralized app (dApp) where users are challenged to try and jailbreak pre-existing LLMs in order to find weaknesses and be rewarded. 🏆

ai bugbounty cryptocurrency cybersecurity prompt-engineering prompt-injection solana solana-program

Last synced: 14 Apr 2025

https://github.com/center-for-threat-informed-defense/summiting-the-pyramid

Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research includes a scoring model, methodology, and worked examples.

ctid cyber-analytics cybersecurity detection-engineering mitre-attack threat-informed-defense

Last synced: 19 Feb 2025

https://github.com/cerberauth/awesome-openid-connect?tab=readme-ov-file

OpenID Connect, the authentication protocol and identity layer on top of OAuth 2.0 used in many SSO and adopted in many social logins (Apple, Facebook, Google, ...etc). Find this curated list of providers, services, libraries, and resources to adopt it and know more about existing specs.

authorization awesome awesome-list ciam cybersecurity fapi iam identity oauth oauth2 oidc openid-connect openidconnect security

Last synced: 31 Jan 2025

https://github.com/silverplate3/goodkit

Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity

cybersecurity linux-kernel syscall-hooking

Last synced: 15 Feb 2025

https://github.com/jakesteam/cybersecurity-certificate-notes

Misc notes from Google's Cybersecurity Professional Certificate

coursera cybersecurity google notes

Last synced: 04 Apr 2025

https://github.com/center-for-threat-informed-defense/sightings_ecosystem

Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE ATT&CK® techniques observed to give defenders real data on technique prevalence.

ctid cyber-threat-intelligence cybersecurity data-science data-visualization mitre-attack

Last synced: 12 Apr 2025

https://github.com/starlingvibes/tryhackme

The source files of my completed TryHackMe challenges and walkthroughs with links to their respective rooms

boot2root cryptography ctf ctf-writeups cybersecurity forensics osint pwn reverse-engineering steganography tryhackme web

Last synced: 15 Apr 2025

https://github.com/jmousqueton/cti-msteams-bot

🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴‍☠️

bot cti cybersecurity feed git-action ms-teams news python ransomware rss rss-feed threat-intelligence webhook

Last synced: 24 Apr 2025

https://github.com/gamemann/the-dpdk-common

A repository that includes common helper functions for writing applications in the DPDK. I will be using this for my future projects in the DPDK.

bypass c common cyber cyber-security cybersecurity dpdk fast intel kernel low-level net-programming network-programming networking networkprogramming packet security

Last synced: 18 Mar 2025

https://github.com/flashnuke/deadnet

A dos (denial of service) attack for local networks using dead router attack (IPv6) and ARP attack (IPv4) simultaneously

arp arp-poisoning arp-spoofing cybersecurity dead-router-attack denial-of-service dos dos-attack ipv4 ipv6 ipv6-security kali-linux pentest pentesting security wifi-attack

Last synced: 17 Mar 2025

https://github.com/ElNiak/PANTHER

This tool presents a novel approach to bolstering network protocol verification by integrating the Shadow network simulator with the Ivy formal verification tool to check time properties. Furthermore, it extends Ivy’s capabilities with a dedicated time module, enabling the verification of complex quantitative-time properties.

cve cybersecurity docker docker-compose formal-methods formal-verification ivy network-analysis network-security network-simulator protocol protocol-tester quic reproducible-research test-automation testing testing-tools tests time-proof transport-layer-protocol

Last synced: 18 Jan 2025

https://github.com/alpine-sec/SPECTR3

Forensic tool for acquisition, triage and analysis of remote block devices via iSCSI protocol.

acquisition cybersecurity forensics iscsi

Last synced: 11 May 2025

https://github.com/jaegeral/firemisp

FireEye Alert json files to MISP Malware information sharing plattform (Alpha)

cyber cybersecurity fireeye fireeye-alert misp misp-api misp-instance threatintel

Last synced: 02 May 2025

https://github.com/ayemunhossain/idord

✅ Experience the power of an automated Insecure Direct Object Reference (IDOR) vulnerability detection tool. Safeguard your applications with cutting-edge technology that identifies potential security weaknesses in an efficient and streamlined manner.

automated-testing ayemunhossain cybersecurity idor idor-attack idor-vulnerability insecure-direct-object-references python python-script python3 security-tools securityscan

Last synced: 01 Dec 2024