-
My own!
Stars
- All languages
- Assembly
- Batchfile
- Bicep
- C
- C#
- C++
- CSS
- Clojure
- Dockerfile
- Elixir
- Erlang
- Go
- HTML
- Hack
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- R
- REXX
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Svelte
- TypeScript
- VBA
- Vim Script
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
- Zeek
A list of public penetration test reports published by several consulting firms and academic security groups.
Gather and update all available and newest CVEs with their PoC.
Automate the creation of a lab environment complete with security tooling and logging best practices
Tools, tips, tricks, and more for exploring ICS Security.
Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber
A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.
Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)
Open-source pentesting management and automation platform by Salesforce Product Security
The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifact validation processes as well as increase access to artifa…
GUI to Manage Software Restriction Policies and harden Windows Home OS
DPS' Lightweight Investigation Notebook
Neet - Network Enumeration and Exploitation Tool
Web/API Gateway with user profiles, billing, and subscription-based access control
Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proactively identify, engage and prevent cyber threats denying or…
simple webapp for converting sigma rules into siem queries using the pySigma library
Python utils library and tools (verify-scts, ctloglist, ...) for Certificate Transparency.