Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for javascript cybersecurity
cybersecurity
x
javascript
x
77 search results found
Gun
⭐
17,626
An open source cybersecurity protocol for syncing decentralized graph data.
Opencti
⭐
4,275
Open Cyber Threat Intelligence Platform
Computer Science Resources
⭐
2,227
A list of resources in different fields of Computer Science
Node Opcua
⭐
1,384
Unlocking the Full Potential of OPC UA with Typescript and NodeJS - http://node-opcua.github.io/
Antenna
⭐
673
Antenna是58同城安全团队打造的一款辅助安全从业人员验证网络中多种漏洞是否存在以及可利用性的工
Soc Multitool
⭐
286
A powerful and user-friendly browser extension that streamlines investigations for security professionals.
Jiff
⭐
241
JavaScript library for building web-based applications that employ secure multi-party computation (MPC).
Dnsfookup
⭐
238
DNS rebinding toolkit
Scot
⭐
227
Sandia Cyber Omni Tracker (SCOT)
Misp Dashboard
⭐
184
A dashboard for a real-time overview of threat intelligence from MISP instances
Docintel
⭐
133
Open Source Platform for storing, organizing, and searching documents related to cyber threats
Cve 2021 21315 Poc
⭐
121
CVE 2021-21315 PoC
Thecyberhub
⭐
111
Welcome to TheCyberHUB, a community-driven platform for hackers, cybersecurity enthusiasts, and IT professionals. Our platform provides a variety of free resources, including Capture The Flag (CTF) challenges, courses, blogs, forums, and much more.
Htmlsmuggler
⭐
100
✉️ HTML Smuggling generator&obfuscator for your Red Team operations
Rfparty Monitor
⭐
88
its like a tricorder, for your wireless world.
Fastdork
⭐
85
⚡Chrome extension allows you to create lists of Google and Github dork to open multiple tabs with one click, import "scope/out of scope" from #HackerOne #Bugcrowd #Intigriti ...
Build A Cybersecurity Startup
⭐
82
This is the code for "Build a Cybersecurity Startup" by Siraj Raval on Youtube
Controlcompass.github.io
⭐
76
Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques
Recon
⭐
75
NodeJS script to extract assets for the Apple bug bounty program from their security acknowledgments page for bug bounty recon.
Klezvirus.github.io
⭐
75
CyberSec Blog
Rfparty Xyz
⭐
60
its like a tricorder, for your wireless world.
Awesome Article Collection
⭐
59
Curated articles by writers, both technical and non-technical. This was made specifically to encourage content creators to discover their strengths and consistently produce quality articles. You are welcome to participate by sending a PR.
Checkmyhttps
⭐
56
We propose a user-friendly add-on that allows you to check if your encrypted web traffic (SSL/TLS) towards secured Internet servers (HTTPS) is not intercepted (being listened to).
Voicesens
⭐
51
A Voice Biometric Application using Watson Speech to Text
Gerobug
⭐
48
The First Open Source Bug Bounty Platform
Ctf_platform
⭐
42
Sieberrsec CTF platform. A Jeopardy CTF platform designed with various neat features to aid in training and learning.
Aerospace Hacking Tools
⭐
42
An astronomical collection of space-related cybersecurity tools 🚀✨
Cloudsec Ninja
⭐
42
Become a CloudSecurity Engineer using the AWS Cloud for free. ☁️🔐🥷
Vichiti
⭐
39
An OSINT focused tool made with Nodejs!
Malicious Urlv5
⭐
38
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Docs.tryhackme.com
⭐
37
TryHackMe documentation site source code
Aisec
⭐
34
Cybersecurity of Machine Learning and Artificial Intelligence
Envisen
⭐
27
ROP gadget finder and analysis in pure Javascript
Hackbox
⭐
22
Hackbox is an open-source, container-based platform that makes it easy to launch vulnerable systems to test your hacking skill!
Tutorials
⭐
21
Additional Resources For Securing The Stack Tutorials
Scanre
⭐
21
Static Code Analysis Toolkit for Vulnerability Detection and Mitigation
Digital Copyright
⭐
17
Stamp your code with a trackable digital copyright
Cybgpt
⭐
17
CybGPT is at the forefront of integrating OpenAI's advanced GPT technology with the complex landscape of cybersecurity.
Cti Stix Diamond Activity Attack Graph
⭐
17
STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling
Anti Phishing Extension
⭐
17
Safeguard your online experience with Anti-Phishing Extension! This extension is meticulously developed to protect users from potential phishing attacks by actively scanning the websites visited in real-time. It employs an updated blacklist to cross-check each website and promptly alerts users if a potential threat is detected, enhancing
Tracer
⭐
16
Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use
Ctfguidereact
⭐
16
Legacy React Client - Please see the new one here: https://github.com/ctfguide-tech/CTFGuideNext
Vigrid
⭐
16
Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualize entire networks not visible between them. Vigrid adds industrial cloning. clientless console accesses. snapshots. unlimited scalability. standalone or infrastructure and cloud designs.
Pakuri Thon
⭐
15
PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication server). PAKURI-THON can perform most of the operations with intuitive web operations and commands to chatbots.
Koth
⭐
14
king of the hill cybersecurity competition
Zwatcher
⭐
14
"zwatcher is a lightweight bash script for monitoring sub/domains or a list of sub/domains and javascript files. It compares HTTP status codes and content length to detect changes and notifies the user when any modifications occur. Easily keep track of your domains' health and security with zwatcher."
Security_hacking_scripts
⭐
14
This Repository contains Encryption Algorithms, Ethical Hacking Scripts, Cybersecurity Learning Resources, and Security-Based Projects. Contribute to this repository as a part of Hacktoberfest Season
Ghost_dir
⭐
13
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
Mitrecnd.github.io
⭐
13
MITRE Shield website
Jigg
⭐
12
JavaScript implementation of garbled gates and 2PC boolean circuit protocols
Secr
⭐
12
Application security made easy
Stevens Computer Science Courses Materials
⭐
12
This repository consists of assignments, lab works, quizzes and more. These assessments belong to the Computer Science major at Stevens Institute of Technology. The materials available in this repository are the among the popular courses offered in Computer Science major in Master of Science. This repository also consists, the solutions of all course works and projects those I solved and submitted during my graduation from Fall 2016 through Spring 2018. Note: All these exercises and assessmen
Cyber Defence Presentation
⭐
11
🖥️ A reveal.js website for presenting the cyber security basics to humans
Program Wars
⭐
10
A web-based educational card game for teaching basic concepts of computer programming and cybersecurity
Projectbrightsun
⭐
9
A suite of cybersecurity tools designed to allow for rapid deployment of virtualized environments. Intended for use in education: contains built-in lessons.
Icci
⭐
9
Industrial Cybersecurity Conference Index
Lactf Website
⭐
9
LA CTF hosted by ACM Cyber & Psi Beta Rho! Website for the largest annual cybersecurity competition at UCLA! Whether you are tackling your first exploit or have professional experience, there will be challenges just right for you!
Cyberspying
⭐
9
cyberspying.eff.org twitter tool
Headmail
⭐
9
A tool designed to analyse email headers
Computerscience
⭐
9
CS.CODE.IN is a 1 year online Computer Science education program to equip yourself with modern and cutting edge programming technologies in the competitive world.
Blog.quentinra.dev
⭐
8
This repository is a collection of notes, links, tutorials, and experiences aimed at helping others. If you find it useful, please consider giving it a star ⭐ to keep me motivated.
Orekicam
⭐
8
Put your Linux capture devices on pause
Sec Crawl
⭐
8
Scraper that collects cybersecurity news from the web + React REST Client
Gencybercoin
⭐
8
GenCyberCoin is a project sponsored by NSA/NSF GenCyber program. A demo is deployed here:
Ccsc Ctf 2020
⭐
8
All challenges for the CCSC 2020 CTF
Jssdk Core
⭐
8
A Javascript Implementation of XQ Message SDK (V.2) which provides convenient access to the XQ Message API.
Splunk Cyences App For Splunk
⭐
8
Cyences App (Cyber Defense) built by CrossRealms International - https://splunkbase.splunk.com/app/5351/
Security Risk Assessment Tool
⭐
8
The ISRA security-risk-assessment-tool project is an Electron based application used to do security risk assessments at a technical level
Exploitableapp
⭐
7
A .NET core project for web based pen testing
Tech Scrolls
⭐
7
Concepts. Books. People. Definitions. Tech.
Hack The Box
⭐
6
HHousen's writeups to various HackTheBox machines and challenges from https://hackthebox.com.
Cybercrime Report Template
⭐
6
Template to use when you've fallen victim of a cybercrime.
C2 Framework
⭐
6
Command and Control development Framework server.
Cyberdash
⭐
6
code behind @WebDevCreations @WebPackSense and @CyberDash Twitter bots
Botnet Visualizer
⭐
6
React project to visualize botnets.
Phishing Detection Ext
⭐
6
"No Phishing" provides robust, real-time protection against phishing threats, ensuring safe browsing and enhanced internet security.
Vsterilizer
⭐
6
VSterilizer is a USB scanning service that scans any USB device plugged into the computer that is running the scanner utility and reports the results through API endpoints.
Ctfguidenext
⭐
6
The new in-development client for CTFGuide built with Next.js.
Digital Security Coach
⭐
5
🔒 Accessible crash course on digital security
Sink
⭐
5
Fish generator (Credentials) for Phishers ⛵
Intro To Ethical Hacking
⭐
5
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penetration testing tools such as the Browser Exploitation Framework, also showed how to inoculate your systems against each malicious action.
Bugbrowser
⭐
5
Bug Browser provides information security, programming, and bug education and reference all in one skill. Bug Browser will teach you how to hack, tell you what a specific bug is, check if you have been hacked, provide a comprehensive briefing on cybersecurity around the world, a list of recent breaches, security tips, information about bug bounty programs and bug bounty platforms, the BugCrowd VRT, active HackerOne programs, and active BugCrowd bounties as well as provide additional information
Cross Site Scripting
⭐
5
🐞 Understand how cross-site scripting occurs, how to detect and exploit XSS vulnerabilities, giving you control of other visitor's browsers.
Network Intrusion Detection System
⭐
5
This is a software application to detect network intrusion by monitoring a network or system for malicious activity and predicts whether it is Normal or Abnormal(attacked with intrusion classes like DOS/PROBE/R2L/U2R).
Related Searches
Javascript Reactjs (121,118)
Javascript Html (48,022)
Javascript Css (46,402)
Javascript Deployment (32,768)
Javascript Express (27,853)
Javascript Command Line (22,145)
Javascript Testing (21,652)
Javascript Redux (21,545)
Javascript Vue (19,769)
Javascript Mongodb (18,598)
1-77 of 77 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.