gcrow's Stars
dgtlmoon/changedetection.io
The best and simplest free open source web page change detection, website watcher, restock monitor and notification service. Restock Monitor, change detection. Designed for simplicity - Simply monitor which websites had a text change for free. Free Open source web page change detection, Website defacement monitoring, Price change notification
owasp-amass/amass
In-depth attack surface mapping and asset discovery
simonw/datasette
An open source multi-tool for exploring and publishing data
turbot/steampipe
Zero-ETL, infinite possibilities. Live query APIs, code & more with SQL. No DB required.
jarun/buku
:bookmark: Personal mini-web in text
build-trust/ockam
Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.
jonaslejon/malicious-pdf
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
dannagle/PacketSender
Network utility for sending / receiving TCP, UDP, SSL, HTTP
graphistry/pygraphistry
PyGraphistry is a Python library to quickly load, shape, embed, and explore big graphs with the GPU-accelerated Graphistry visual graph analyzer
someengineering/resoto
Resoto creates an inventory of your cloud ☁️, provides deep visibility 👀, and reacts to changes in your infrastructure 🌐.
vchinnipilli/kubestriker
A Blazing fast Security Auditing tool for Kubernetes
aws-samples/aws-incident-response-playbooks
EFForg/apkeep
aws-solutions/workload-discovery-on-aws
Workload Discovery on AWS is a solution to visualize AWS Cloud workloads. With it you can build, customize, and share architecture diagrams of your workloads based on live data from AWS. The solution maintains an inventory of the AWS resources across your accounts and regions, mapping their relationships and displaying them in the user interface.
Arudjreis/awesome-security-GRC
Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).
dowjones/hammer
Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)
domain-protect/domain-protect
OWASP Domain Protect - prevent subdomain takeover
optiv/mobile-nuclei-templates
nccgroup/Solitude
Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more advanced researcher, Solitude makes the process of evaluating user privacy within an app accessible for everyone.
OpenCSPM/opencspm
Open Cloud Security Posture Management Engine
espruino/EspruinoHub
A BLE -> MQTT bridge for Raspberry Pi and other Embedded devices
rpetrich/patrolaroid
A production-friendly malware scanner for your AWS cloud
raverrr/plution
Prototype pollution scanner using headless chrome
yarrow/zet
CLI utility to find the union, intersection, set difference, etc of files considered as sets of lines
openraven/magpie
A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat landscape such as cloud ransomware and supply chain attacks.
stacscan/stacs
Static Token And Credential Scanner
goldfiglabs/sgCheckup
sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
akamai/luda
Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs path by inspecting internet traffic. Moreover, deep learning models or even regular ML model do not fit for inline deployment in terms of running performance. However, regexes ( or YARA rules ) can be deployed on a proxy and work in real time on all the traffic. LUDA can take a set of malicious and benign URLs and return a list of regexes ready to be deployed inline !
danielcuthbert/home-assistant
Just a dump of all the home assistant things I've been tinkering with
MikeWalrus/docx-you-want
An unusual PDF-to-DOCX converter.