Pinned Repositories
awesome-log-analysis
A list of awesome research on log analysis, anomaly detection, fault localization, and AIOps
Cr3dOv3r
Know the dangers of credential reuse attacks.
Drain3
Drain log template miner in Python3
Free_CyberSecurity_Professional_Development_Resources
An awesome list of FREE resources for training, conferences, speaking, labs, reading, etc that are free. Originally built during COVID-19 for cybersecurity professionals with downtime can take advantage of to improve their skills and marketability to come out on the other side ready to rock. Now its taken on a life of its own and will persist, COVID be damned.
gatepy
FortiGate Automation using REST API
gsuite-dfir
Hardware-and-Firmware-Security-Guidance
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
ICS-Security-Tools
Tools, tips, tricks, and more for exploring ICS Security.
langchain
🦜🔗 Build context-aware reasoning applications
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
cynorsense's Repositories
cynorsense/awesome-log-analysis
A list of awesome research on log analysis, anomaly detection, fault localization, and AIOps
cynorsense/Cr3dOv3r
Know the dangers of credential reuse attacks.
cynorsense/Drain3
Drain log template miner in Python3
cynorsense/Free_CyberSecurity_Professional_Development_Resources
An awesome list of FREE resources for training, conferences, speaking, labs, reading, etc that are free. Originally built during COVID-19 for cybersecurity professionals with downtime can take advantage of to improve their skills and marketability to come out on the other side ready to rock. Now its taken on a life of its own and will persist, COVID be damned.
cynorsense/gatepy
FortiGate Automation using REST API
cynorsense/gsuite-dfir
cynorsense/Hardware-and-Firmware-Security-Guidance
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
cynorsense/ICS-Security-Tools
Tools, tips, tricks, and more for exploring ICS Security.
cynorsense/langchain
🦜🔗 Build context-aware reasoning applications
cynorsense/Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
cynorsense/process-pentest-blackbox-ptes
High level overview of GoVanguard's blackbox network penetration testing methodology (PTES based)
cynorsense/ThreatCheck
Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
cynorsense/trape
People tracker on the Internet: OSINT analysis and research tool by Jose Pino
cynorsense/Zeus
AWS Auditing & Hardening Tool