Highlights
- All languages
- Ada
- Assembly
- Batchfile
- C
- C#
- C++
- CSS
- CodeQL
- Crystal
- Dart
- Dockerfile
- Go
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Markdown
- Nim
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- QMake
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- SuperCollider
- Swift
- TypeScript
- VBA
- Vim Script
- Vue
- YARA
- Zeek
- Zig
Starred repositories
wappalyzer alternative based on wappalyzer browser extension
Red Team C2 Framework with AV/EDR bypass capabilities.
A machine learning-based video super resolution and frame interpolation framework. Est. Hack the Valley II, 2018.
A high-performance, zero-overhead, extensible Python compiler with built-in NumPy support
🛡️ Open-source and next-generation Web Application Firewall (WAF)
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way …
CarbonBlack EDR detection rules and response actions
AI-powered tool designed to help producing Threat Intelligence Mindmap.
Automated threat intel feed parsing and consolidation💻👾🤖
Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS
Live Feed of C2 servers, tools, and botnets
CERT Transparency Log Monitoring for brand names and mailing domain names to detect phishing and brand impersonations
GRR Rapid Response: remote live forensics for incident response
PowerShell Digital Forensics & Incident Response Scripts.
Tool to look for several security related Android application vulnerabilities
Rapidly Search and Hunt through Windows Forensic Artefacts
Collection of dorking-related resources. Dorks lists, Cheatsheets, Articles, Databases. Google, Yahoo, Yandex, Bing, Baidu, DuckDuckGo, Brave, Ecosia, Qwant.
Collection of Cyber Threat Intelligence sources from the deep and dark web
A curated list of GPT agents for cybersecurity
This repository serves as a place for community created Targets and Modules for use with KAPE.
Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.