antony-chiossi's Stars
jax-ml/jax
Composable transformations of Python+NumPy programs: differentiate, vectorize, JIT to GPU/TPU, and more
emilwallner/Screenshot-to-code
A neural network that transforms a design mock-up into a static website.
fortra/impacket
Impacket is a collection of Python classes for working with network protocols.
wazuh/wazuh
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
angular/protractor
E2E test framework for Angular apps
vmware-archive/clarity
Clarity is a scalable, accessible, customizable, open source design system built with web components. Works with any JavaScript framework, built for enterprises, and designed to be inclusive.
s0md3v/Arjun
HTTP parameter discovery suite.
dhowe/AdNauseam
AdNauseam: Fight back against advertising surveillance
a0rtega/pafish
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
JPCERTCC/LogonTracer
Investigate malicious Windows logon by visualizing and analyzing Windows event log
cloud-annotations/cloud-annotations
🐝 A fast, easy and collaborative open source image annotation tool for teams and individuals.
wtsxDev/Machine-Learning-for-Cyber-Security
Curated list of tools and resources related to the use of machine learning for cyber security
angea/pocorgtfo
a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.
yampelo/beagle
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
target/strelka
Real-time, container-based file scanning at enterprise scale
InQuest/ThreatIngestor
Extract and aggregate threat intelligence.
praetorian-inc/purple-team-attack-automation
Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs
nongiach/sudo_inject
[Linux] Two Privilege Escalation techniques abusing sudo token
gbrindisi/malware
malware source codes
MarcoPon/SeqBox
A single file container/archive that can be reconstructed even after total loss of file system structures
Coalfire-Research/Slackor
A Golang implant that uses Slack as a command and control server
SafeBreach-Labs/SirepRAT
Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)
REhints/Publications
Conference slides and White-papers
google/node-sec-roadmap
Some thoughts on how Node.js might respond to a changing security environment
cubbit/enigma
A fast, native, cryptographic engine for the web
leeberg/BlueCommand
Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard
videlanicolas/assimilator
Automatic firewall rule orchestator.
TestingPens/Constole
Scan for and exploit Consul agents
mikesamuel/node-sec-patterns
Security design pattern support for Node.js
UniCT-WebDevelopment/VCrypture
VCrypture is an online service that allows you to encrypt your secret images safely using visual cryptographic algorithms.