Stars
Collaborative Incident Response platform
kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.
A self hosted virtual browser that runs in docker and uses WebRTC.
Shredos Disk Eraser 64 bit for all Intel 64 bit processors as well as processors from AMD and other vendors which make compatible 64 bit chips. ShredOS - Secure disk erasure/wipe
Run Windows apps such as Microsoft Office/Adobe in Linux (Ubuntu/Fedora) and GNOME/KDE as if they were a part of the native OS, including Nautilus integration. Hard fork of https://github.com/Fmst…
Atom's One Dark and One Light theme for GNOME Terminal
Customizable SIEM and XDR powered by Real-Time correlation and Threat Intelligence
Talos Linux is a modern Linux distribution built for Kubernetes.
Stress test your disks / memory cards / USB sticks before trusting your valuable data to them
Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.
drawthe.net draws network diagrams dynamically from a text file describing the placement, layout and icons. Given a yaml file describing the hierarchy of the network and it's connections, a resulti…
Demisto is now Cortex XSOAR. Automate and orchestrate your Security Operations with Cortex XSOAR's ever-growing Content Repository. Pull Requests are always welcome and highly appreciated!
Test Blue Team detections without running any attack.
A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
A free, secure and open source app for Android to manage your 2-step verification tokens.
SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: https://datatracker.ietf.org/doc/draft-michel-ssh3/
Zero-Trust access management with true WireGuard® 2FA/MFA
`pdf2searchablepdf input.pdf` = voila! "input_searchable.pdf" is created & now has searchable text!
Bubblewrap based sandboxing for desktop applications
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)