fbausch's Stars
EbookFoundation/free-programming-books
:books: Freely available programming books
mastodon/mastodon
Your self-hosted, globally interconnected microblogging community
jitsi/jitsi-meet
Jitsi Meet - Secure, Simple and Scalable Video Conferences that you use as a standalone app or embed in your web application.
p8952/bocker
Docker implemented in around 100 lines of bash
moonD4rk/HackBrowserData
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
juice-shop/juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
VirusTotal/yara
The pattern matching swiss knife
horsicq/Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
Yara-Rules/rules
Repository of yara rules
kaitai-io/kaitai_struct
Kaitai Struct: declarative language to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Nim / Perl / PHP / Python / Ruby
peterbrittain/asciimatics
A cross platform package to do curses-like operations, plus higher level APIs and widgets to create text UIs and ASCII art animations
InQuest/awesome-yara
A curated list of awesome YARA rules, tools, and people.
jtesta/ssh-audit
SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
DidierStevens/DidierStevensSuite
Please no pull requests for this repository. Thanks!
fangfufu/Linux-Fake-Background-Webcam
Faking your webcam background under GNU/Linux, now supports background blurring, animated background, colour map effect, hologram effect and on-demand processing.
keroserene/rickrollrc
Rick Astley invades your terminal.
sepinf-inc/IPED
IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation by private examiners.
writing-resources/awesome-scientific-writing
:keyboard: A curated list of awesome tools, demos and resources to go beyond LaTeX
jparise/chrome-utm-stripper
Browser extension that strips Google Analytics (UTM) parameters, and various other click tracking tokens, from URL query strings
agendav/agendav
A CalDAV web client similar to Google Calendar
lawrenceamer/0xsp-Mongoose
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
zbetcheckin/PDF_analysis
Several PDF analysis reassembled with additional tips and tools
PwC-IR/Business-Email-Compromise-Guide
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.
tomchop/unxor
unXOR will search a XORed file and try to guess the key using known-plaintext attacks.
rigglemania/pysqlcipher3
Python 3 bindings for SQLCipher
ernw/quarantine-formats
Documentation and parsers for different anti-virus quarantine formats.
sistason/db_wlan_manager
Monitors your Wifi to keep you logged in and resets your Wifi, if your data is drained
abjur/brcities
Download city indicators from IBGE and Seade
ernw/forensic-hsts-analyzer
Tool to analyze HSTS caches during file system analysis.
fbausch/n-queen-problem