beriox's Stars
oneoffdallas/check_ioc
Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was primarily written to be run on a schedule from a monitoring engine such as Nagios, however, it may also be run from a command-line (for incident response). For more information on the script and the logic behind it, check out https://www.linuxincluded.com/uncovering-indicators-of-compromise.
GoogleCloudPlatform/generative-ai
Sample code and notebooks for Generative AI on Google Cloud, with Gemini on Vertex AI
ossf/scorecard
OpenSSF Scorecard - Security health metrics for Open Source
philhagen/sof-elk
Configuration files for the SOF-ELK VM
353solutions/gosec-1022
LinkedInLearning/secure-coding-go-3009233
Secure Coding in Go
love2d/love
LÖVE is an awesome 2D game framework for Lua.
games50/pong
Atari's 1972 classic, implemented in Lua with LÖVE
pophealth/popHealth
popHealth - An Open Source Population Health Reporting Prototype
Azure/Azure-Sentinel
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
todogroup/todogroup.org
Official TODO Website that containts TODO Guides, OSPO use cases and more resources to advance in the OSPO journey
kubeshark/kubeshark
The API traffic analyzer for Kubernetes providing real-time K8s protocol-level visibility, capturing and monitoring all traffic and payloads going in, out and across containers, pods, nodes and clusters. Inspired by Wireshark, purposely built for Kubernetes
gosu/gosu
2D game development library for Ruby and C++
synthetichealth/synthea
Synthetic Patient Population Simulator
italia/spid-idp-proxy-shibboleth
Shibboleth IDP con possibilità di delegare l'autenticazione ad un IDP SPID.
iovisor/bcc
BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more
kakoni/awesome-healthcare
Curated list of awesome open source healthcare software, libraries, tools and resources.
The-Art-of-Hacking/h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework
andreacristaldi/APTmap
Graphical map of known Advanced Persistent Threats
WebAssembly/wasm-c-api
Wasm C API prototype
sleuthkit/autopsy
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
meirwah/awesome-incident-response
A curated list of tools for incident response
standardhealth/shr-design
Standard Health Record
Security-Onion-Solutions/securityonion
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such as osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
VirusTotal/yara
The pattern matching swiss knife
vmware/vsphere-automation-sdk-python
Python samples, language bindings, and API reference documentation for vSphere, VMC, and NSX-T using the VMware REST API
vmware/pyvmomi
VMware vSphere API Python Bindings
Threagile/threagile
Agile Threat Modeling Toolkit
prowler-cloud/prowler
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more