c-bless's Stars
OWASP/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
DarkFlippers/unleashed-firmware
Flipper Zero Unleashed Firmware
CISOfy/lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
drwetter/testssl.sh
Testing TLS/SSL encryption anywhere on any port
V33RU/IoTSecurity101
A Curated list of IoT Security Resources
e-m-b-a/emba
EMBA - The firmware security analyzer
OWASP/API-Security
OWASP API Security Project
ITI/ICS-Security-Tools
Tools, tips, tricks, and more for exploring ICS Security.
cisagov/cset
Cybersecurity Evaluation Tool
S1ckB0y1337/Cobalt-Strike-CheatSheet
Some notes and examples for cobalt strike's functionality
cisagov/LME
Logging Made Easy (LME) is a no-cost and open logging and protective monitoring solution serving all organizations.
scriptingxss/owasp-fstm
The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers, consultants, and Information Security professionals with conducting firmware security assessments.
pwndoc-ng/pwndoc-ng
Pentest Report Generator
cutaway-security/chaps
Configuration Hardening Assessment PowerShell Script (CHAPS)
cisagov/ICSNPP
Industrial Control Systems Network Protocol Parsers
OWASP/IoT-Security-Verification-Standard-ISVS
OWASP IoT Security Verification Standard (ISVS)
LuemmelSec/PwnDoc-Vulns
gnebbia/nmap_tutorial
Some collected notes about nmap
OWASP/owasp-istg
The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results.
utilsec/ICS_OT_Intro_Course_Resources
Fraunhofer-FIT-DIEN/iec104-python
A Python module to simulate SCADA and RTU communication over protocol 60870-5-104 to research ICT behavior in power grids.
cutaway-security/IACS_STAR_Methodology
A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.
Kavakuo/HID-File-Transfer
Flipper Zero application to transfer files using HID.