michaelsanford's Stars
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
github/copilot-docs
Documentation for GitHub Copilot
buger/goreplay
GoReplay is an open-source tool for capturing and replaying live HTTP traffic into a test environment in order to continuously test your system with real data. It can be used to increase confidence in code deployments, configuration changes and infrastructure changes.
owasp-amass/amass
In-depth attack surface mapping and asset discovery
ytisf/theZoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
lengstrom/fast-style-transfer
TensorFlow CNN for fast style transfer ⚡🖥🎨🖼
digininja/DVWA
Damn Vulnerable Web Application (DVWA)
vanhauser-thc/thc-hydra
hydra
mxgmn/MarkovJunior
Probabilistic language based on pattern matching and constraint propagation, 153 examples
zeek/zeek
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
MISP/MISP
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
InQuest/awesome-yara
A curated list of awesome YARA rules, tools, and people.
Neo23x0/Loki
Loki - Simple IOC and YARA Scanner
keephq/keep
The open-source alert management and AIOps platform
berdav/CVE-2021-4034
CVE-2021-4034 1day
6mile/DevSecOps-Playbook
This is a step-by-step guide to implementing a DevSecOps program for any size organization
center-for-threat-informed-defense/adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
dmarman/sha256algorithm
Sha256 Algorithm Explained
matanolabs/matano
Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
vanhoefm/fragattacks
aws-samples/aws-security-reference-architecture-examples
Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (including Customizations for AWS Control Tower) and Terraform.
Zero3K/ERAM
Open Source RAM Disk
aws-samples/amazon-cognito-passwordless-auth
Passwordless authentication with Amazon Cognito: FIDO2 (WebAuthn, support for Passkeys), Magic Link, SMS OTP Step Up
jubalh/nudoku
ncurses based sudoku game
tid4l/GoWard
A robust Red Team proxy written in Go.
hillu/local-spring-vuln-scanner
Simple local scanner for applications containing vulnerable Spring libraries
alt3kx/CVE-2022-22965
Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)
jamescussen/PortalsReleases
Portals for Office 365 Releases
adamhwang/optioncharts.net
Interactive option payoff charts
jfrog/jfrog-CVE-2022-21449