jth0's Stars
jgamblin/KEV_EPSS
KEV EPSS Data
mrwadams/stride-gpt
An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRIDE methodology.
hackertarget/nmap-did-what
Nmap Dashboard Mini Project
mrwadams/attackgen
AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details.
Hive-Systems/pyfair
Factor Analysis of Information Risk (FAIR) model written in Python. Managed and maintained by Hive Systems
crashappsec/chalk
Chalk allows you to follow code from development, through builds and into production.
nccgroup/ScoutSuite
Multi-Cloud Security Auditing Tool
r3volved/CVEAggregate
Build a CVE library with aggregated CISA, EPSS and CVSS data
trufflesecurity/trufflehog
Find, verify, and analyze leaked credentials
strongdm/comply
Compliance automation framework, focused on SOC2
redcanaryco/mac-monitor
Red Canary Mac Monitor is an advanced, stand-alone system monitoring tool tailor-made for macOS security research. Beginning with Endpoint Security (ES), it collects and enriches system events, displaying them graphically, with an expansive feature set designed to reduce noise.
newren/git-filter-repo
Quickly rewrite git repository history (filter-branch replacement)
sleuthkit/autopsy
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
sleuthkit/sleuthkit
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
EricZimmerman/KapeFiles
This repository serves as a place for community created Targets and Modules for use with KAPE.
keydet89/RegRipper3.0
RegRipper3.0
usnistgov/OSCAL
Open Security Controls Assessment Language (OSCAL)
davidski/evaluator
⚖Open Source Toolkit for Quantitative Risk Assessment
davidski/collector
⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews
societyinforisk/code-of-conduct
Code of Conduct
giuspen/cherrytree
cherrytree
keybase/client
Keybase Go Library, Client, Service, OS X, iOS, Android, Electron
TryCatchHCF/DumpsterFire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
letsencrypt/cp-cps
ISRG / Let's Encrypt CP and CPS Documents
GRCCraigEr/ReasonableSecurity
Text-mining project for SIRA members and freinds
keybase/keybase-issues
A single repo for managing publicly recognized issues with the keybase client, installer, and website.
altercation/solarized
precision color scheme for multiple applications (terminal, vim, etc.) with both dark/light modes