justuspost's Stars
hmaverickadams/DeHashed-API-Tool
A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresses, and more.
bluecapesecurity/PWF
Practical Windows Forensics Training
Ahmed-AL-Maghraby/Windows-Registry-Analysis-Cheat-Sheet
google/fuzzing
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
r1cksec/cheatsheets
Collection of knowledge about information security
A-poc/BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
LuemmelSec/Pentest-Tools-Collection
GreyDGL/PentestGPT
A GPT-empowered penetration testing tool
awslabs/aws-security-assessment-solution
An AWS tool to help you create a point in time assessment of your AWS account using Prowler.
advanced-security/enterprise-security-team
Manage a uniform team of security managers for every organization in your enterprise
CyberSecurityUP/Cloud-Security-Attacks
Azure and AWS Attacks
toniblyx/my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
owasp-amass/amass
In-depth attack surface mapping and asset discovery
last-byte/PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
Rezilion/mi-x
Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
shieldfy/API-Security-Checklist
Checklist of the most important security countermeasures when designing, testing, and releasing your API
Azure/Microsoft-Defender-for-Cloud
Welcome to the Microsoft Defender for Cloud community repository
microsoft/oss-ssc-framework
Open Source Software Secure Supply Chain Framework
devops-kung-fu/bomber
Scans Software Bill of Materials (SBOMs) for security vulnerabilities