Lists (32)
Sort Name ascending (A-Z)
Authentification
Service et solution d'authentification Open-Source !BlueTeam-Tools
BlueTeam-ToolsCheat Sheet Series
Cheat Sheet SeriesCloud Security Auditing
Cloud Security AuditingCode Analysis
Static Analysis ToolsCyberSecurity-Search-Engines
CyberSecurity-Search-Engines - Tools/Guide etc...Data Science - Graphics Tools
Data Science - Graphics ToolsDFIR - Forensics / Analysis
Digital Forensic Analysis and Incident ResponseExploit
Code exploitFirewall
Solutions pare-feu tout OS client.Free Labs to train your Pentest
Free Labs for Pentesting Training !Hacking - Pentest
HackTricks / Tips to Pentest Learning ...IDS - IPS - NSM - NAC
IDS - IPS - Network Security Monitoring - Network Access ControlLinux Hacking (PEET)
Linux Privilege Escalation Enumeration ToolsLinux Monitoring
Linux System Optimizer and MonitoringLinux Security
Linux Security and Hardening SecurityMalware Analysis - Sandboxing
Malware Analysis - SandboxingNetwork Monitoring
Network MonitoringNetworking
OS Devices - Smartphones
OS Devices - SmartphonesOSINT
Open Source Intelligence - Threat IntelligenceProxy - Reverse Proxy
Proxy - Reverse ProxyRedTeam-Tools
RedTeam-ToolsReverse Engineering
Reverse EngineeringScraping - Crawling
Scraping - CrawlingSecurity Monitoring
Security Monitoring (Tools & Platforms)SIEM - SIRP - SOAR
SIEM - SIRP - SOARThreat Hunting
Virtual Solution
Virtualisation - Conteneurisation - Emulation - SimulationVulnerabilities
Vulnerability Tools - DisclosuresWAFs
Web Application FirewallWebSec
Navigation sécuriséeStarred repositories
Fully featured and community-driven hacking environment
Digital Forensics and Incident Response (DFIR)
🐍 A toolkit for testing, tweaking and cracking JSON Web Tokens
FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation algorithm malware traffic.
For all these times you're asking yourself "what is this panel again?"
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
This repository has the JSON file required to perform user enumeration on various websites.
Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks.
Sample Vagrant Files and things for Network Programmability Development
Collection of scripts and examples of Python code, libraries, and utilities for working with Network Devices.
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Repo for Automations and other solutions for Elastic SIEM/Security.
Docker Container for Elastic Detection CLI
Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
Define and run multi-container applications with Docker
Open Cyber Threat Intelligence Platform
Auditing for TLS certificates (Go code)
OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations
Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.