gdbelvin
Head of Information Security at HRT Key Transparency Founder, E2E Encryption Protocols, Cyber Policy, NGO Security Consultant
Hudson River TradingLondon
gdbelvin's Stars
osquery/osquery
SQL powered operating system instrumentation, monitoring, and analytics.
gitleaks/gitleaks
Protect and discover secrets using Gitleaks 🔑
tink-crypto/tink
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
hslatman/awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
jorgef/engineeringladders
A framework for Engineering Managers
megadose/holehe
holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
facebookresearch/Kats
Kats, a kit to analyze time series data, a lightweight, easy-to-use, generalizable, and extendable framework to perform time series analysis, from understanding the key statistics and characteristics, detecting change points and anomalies, to forecasting future trends.
JustAnotherArchivist/snscrape
A social networking service scraper in Python
warp-tech/warpgate
Smart SSH, HTTPS and MySQL bastion that requires no additional client-side software
google/cel-spec
Common Expression Language -- specification and binary representation
WithSecureLabs/chainsaw
Rapidly Search and Hunt through Windows Forensic Artefacts
ropnop/kerbrute
A tool to perform Kerberos pre-auth bruteforcing
Aorimn/dislocker
FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX
nsacyber/Windows-Secure-Host-Baseline
Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber
SAP/macOS-enterprise-privileges
For Mac users in enterprise environments, this application gives users control over the administration of their machine by elevating their level of access to administrator privileges on macOS. Users can set a timeframe in the application's settings to perform specific tasks, such as installing or removing an application.
facebookincubator/nvdtools
A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)
bellingcat/tiktok-hashtag-analysis
Provides tools to analyze hashtags within posts scraped from TikTok.
fulldecent/corelocationcli
Command line program to print location information from CoreLocation
G-Research/siembol
An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced security analytics framework.
center-for-threat-informed-defense/insider-threat-ttp-kb
The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
aecolley/client_bash
Client Bash library for talking to the Prometheus pushgateway
cashapp/pivit
resurrecting-open-source-projects/dcfldd
Enhanced version of dd for forensics and security
GoogleCloudPlatform/knfsd-cache-utils
A set of utilities for building, deploying and operating a high performance NFS Cache in Google Cloud. This is designed to be used for certain HPC and burst compute use-cases where there is a requirement for a high performance NFS cache between a NFS Server and its downstream NFS Clients.
barnumbirr/ares
A python wrapper around https://cve.circl.lu.
brandonweeks/acme-device-attest-demo
anthonyaje/SNFS
Simple Network Filesystem implementation in C++ leveraging GRPC and FUSE
johnjohnsp1/capsule8
Capsule8: open-source cloud-native behavioral security monitoring
aaronzhuclover/Home-Price-Prediction-forPublic
pylls/steady
A simple end-to-end secure logging system