its-a-lisa-at-work's Stars
navapbc/template-application-nextjs
Next.js, TypeScript, USWDS, and Storybook template, including CI/CD, for teams at Nava building web applications
aj-stein-nist/oscal-2023-workshop
CVEProject/cvelist
Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023
cassidoo/morsemoji
Translate text to morse code, but the morse code is emojis
alphagov/signon
Single sign-on service for GOV.UK
ossf/Project-Security-Metrics
Collect, curate, and communicate relevant security metrics for open source projects.
jeremylong/DependencyCheck
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
CERTCC/SBOM
Examples and proof-of-concept for Software Bill of Materials (SBOM) code & data
idaholab/STIG
Structured Threat Intelligence Graph
Labs64/swid-generator
Generate SoftWare IDentification (SWID) Tags according to ISO/IEC 19770-2:2015
flexion/TTS-10x
10x related activity
redteam-project/sckg
Security Control Knowledge Graph
cclabsInc/RFCrack
A Software Defined Radio Attack Tool
grimm-co/IoTCameraLab
Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital
JPaulMora/Pyrit
The famous WPA precomputed cracker, Migrated from Google.
yeyintminthuhtut/Awesome-Red-Teaming
List of Awesome Red Teaming Resources
W00t3k/Awesome-Cellular-Hacking
Awesome-Cellular-Hacking
notpike/SDR-Notes
Notes and resorce's for SDR/Wireless tech
LOLBAS-Project/LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
secarmy/resources
Everything You Need
thehackingsage/hacktronian
Tools for Pentesting
EdOverflow/bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
uscensusbureau/fismatic
OWASP/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
trevorbryant/fedramp-ssp
Taking FedRAMP templates to Markdown
sundhaug92/vifi
ChrisTheCoolHut/Zeratool
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
Proxmark/proxmark3
Proxmark 3
k3s-io/k3s
Lightweight Kubernetes
woj-ciech/Danger-zone
Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.