Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security cyber
cyber
x
security
x
34 search results found
Pywhat
⭐
6,136
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
Opencti
⭐
4,275
Open Cyber Threat Intelligence Platform
Name That Hash
⭐
1,373
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
Cherrybomb
⭐
1,009
Stop half-done APIs! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by auditing your API specifications, validating them and running API security tests.
Windows Optimize Harden Debloat
⭐
903
Enhance the security and privacy of your Windows 10 and Windows 11 deployments with our fully optimized, hardened, and debloated script. Adhere to industry best practices and Department of Defense STIG/SRG requirements for optimal performance and security.
Haiti
⭐
532
🔑 Hash type identifier (CLI & lib)
Firewalla
⭐
512
http://firewalla.com
Masterparser
⭐
238
MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs
Rawsec Cybersecurity Inventory
⭐
221
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Mrkaplan
⭐
200
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.
Typedb Cti
⭐
134
Open Source Threat Intelligence Platform
Writeups
⭐
133
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Turbo Scanner
⭐
120
A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts's ip or fqdn with the sole purpose of testing your own network to ensure there are no malicious services running.
Standalone Windows Stig Script
⭐
105
Create a compliant and secure Windows 10/11 system with our Gold Master image creation tool. Adhere to DoD STIG/SRG Requirements and NSA Cybersecurity guidance for standalone Windows systems with ease, using our ultimate STIG script.
Forensicminer
⭐
98
A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.
Securitytools
⭐
77
a curated set of projects for security investigators 👨👩👧
Openapi Apps
⭐
71
Swagger/ OpenAPI specifications for security products and services
Standalone Windows Server Stig Script
⭐
46
Enhance the security and compliance of your standalone Windows servers with our STIG script, specifically designed to meet DoD STIG/SRG requirements and NSACyber guidance. Achieve ultimate Windows Server protection with our easy-to-use script.
Python Sigma
⭐
41
Python API for interacting with sigma rules.
Exploitprotection
⭐
39
Windows Exploit Protection Settings (Ultimate)
Cyber Security Framework
⭐
31
The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where you can execute and create new programs for any purpuse that go under your own responsibility to fit your needs. (You can still use/extend it to fit on any unrelated needs of your own).
The Dpdk Examples
⭐
29
Program examples utilizing the DPDK. The DPDK is a kernel-bypass network library that allows for very fast network packet processing. This is great for (D)DoS mitigation and low-latency packet inspection, manipulation, and forwarding.
Webrecon
⭐
21
A collection of pentesting web scanners
The Dpdk Common
⭐
18
A repository that includes common helper functions for writing applications in the DPDK. I will be using this for my future projects in the DPDK.
Void
⭐
16
VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute force and other things... You have many choices. If you want to learn penetration , VOID may be a teacher for you. Because its open source code project. Please look VOID's source code and examine commands! And please dont forget to star project.
Binaries
⭐
14
A mirror of several precompiled standalone red-teaming tools.
Devops Architect Bootcamp
⭐
12
DevOps Boot Camp
Awsresecurity
⭐
10
Interactive learning Platform on #AWSSecurity and #BlueTeam
The Box
⭐
10
A tool box with 174 useful and common Linux tools for penetration testing and security audits.
Miniss
⭐
9
Displays a list of open listening sockets. It is a minimal alternative to ss or netstat.
Threat Intelligence Twitter Usernames
⭐
7
Threat Intelligence ile ilgilenenlerin takip etmesini önerdiğim kullanıcı adlarının listesi
Cyber Crimes And Its Awareness
⭐
7
This repo contains all info related to cyber crimes and its awareness, please do your quality contribution... **only quality contribution accepted**
Competitivecyberclubs.github.io
⭐
6
This is the source code for the Competitive Cyber Clubs website.
Jiraya
⭐
6
JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and conducting tests.
Related Searches
Security Vulnerabilities (12,357)
Laravel Security (11,580)
Php Security (10,611)
Javascript Security (2,859)
Html Security (2,284)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
C Security (886)
1-34 of 34 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.