Liffe93
🌱 learning #dataPrivacy, #cybersecurity & #infosec 👩💻 interested in making apps and art that help inform people of why they should care of digital privacy
Liffe93's Stars
actuated/nmaparse
Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a summary table.
gdanezis/PET-Exercises
Exercises in Privacy Enhancing Technologies (UCL Information Security MSc; Course COMPGA17)
kiprotect/kodex
A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and personal data: Privacy and security as code.
mplspunk/awesome-privacy-engineering
A curated list of resources related to privacy engineering
Cignoraptor-ita/cignotrack
OSINT tool for testing privacy and social engineering vulnerability of organizations.
usnistgov/PrivacyEngCollabSpace
Privacy Engineering Collaboration Space
bdetwiler/draft-detecting-unwanted-location-trackers
cs50/libcs50
This is CS50's Library for C.
N0rz3/Phunter
Phunter is an osint tool allowing you to find various information via a phone number 🔎📞
protectai/modelscan
Protection against Model Serialization Attacks
projectdiscovery/nuclei
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the internet. It helps you find vulnerabilities in your applications, APIs, networks, DNS, and cloud configurations.
Security-Onion-Solutions/securityonion
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such as osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
OWASP/OFFAT
The OWASP OFFAT tool autonomously assesses your API for prevalent vulnerabilities, though full compatibility with OAS v3 is pending. The project remains a work in progress, continuously evolving towards completion.
aquasecurity/trivy
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
semanser/codel
✨ Fully autonomous AI Agent that can perform complicated tasks and projects using terminal, browser, and editor.
hakluke/haktrails
Golang client for querying SecurityTrails API data
Liffe93/graphQL-mindmap
A mindmap for finding, testing and exploiting graphQL vulnerabilities for remedation.
wddadk/OSINT-for-countries
Methodology, links, tools for OSINT in different countries
xanonDev/BLUETOOTH-DOS-ATTACK-SCRIPT
Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes
memochou1993/gpt-ai-assistant
OpenAI + LINE + Vercel = GPT AI Assistant
mvt-project/mvt
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
danielmiessler/fabric
fabric is an open-source framework for augmenting humans using AI. It provides a modular framework for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.
0x4D31/detection-and-response-pipeline
✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The purpose is to create a reference hub for designing effective threat detection and response pipelines. 👷 🏗
XRAccessibility/xraccessibility.github.io
visible-cx/databroker_remover
Source code for remover.visiblelabs.org
mvondracek/VR-MitR-C2-Bigscreen
VR Man-in-the-Room Attack and Command & Control Server Proof of Concept — Bigscreen
EONRaider/blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
mikesiko/PracticalMalwareAnalysis-Labs
Binaries for the book Practical Malware Analysis
SafeEval/practical-malware-analysis
Exercise writeups from the book Practical Malware Analysis.
ComplianceAsCode/content
Security automation content in SCAP, Bash, Ansible, and other formats