preity-p's Stars
cyberImperial/attack-graphs
Attack graph construction and analysis
DanMcInerney/Autobloodhound
Automatically parses and attacks BloodHound-generated graphs
tchapi/markdown-cheatsheet
Markdown Cheatsheet for Github Readme.md
vecna/sniffjoke
a client-only layer of protection from the wiretap/sniff/IDS analysis
fabio-d/honeypot
Honeypot that emulates several protocols (incl. SSH, telnet, SMTP, HTTP, SSL and SIP)
EmreOvunc/Log-Analysis
SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.
dc-9111/infosec-resources
Collection of stuffs related to Information Security
DevDungeon/NanoPot
Simple TCP honeypot
PacktPublishing/Mastering-Python-for-Networking-and-Security
Mastering Python for Networking and Security published by Packt
OWASP/Nettacker
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
PacktPublishing/Mastering-Python-for-Networking-and-Security-Second-Edition
Mastering Python for Networking and Security, Second Edition, published by Packt
archanchoudhury/Davy-Jones-Locker
Getting FREE Cyber Security Resources have been a challenge always. Access Davy-Jones-Locker to get all what you might need to upskill yourself and create an impact in the InfoSec Community
meirwah/awesome-incident-response
A curated list of tools for incident response
fabacab/awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
keithjjones/hostintel
A modular Python application to collect intelligence for malicious hosts.
ksid49/Intrusion-detection-system
This project contains intrusion detection system where a neural network is trained to detect various types of attacks and compared with other classifiers
felixe/idsEventGenerator
aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based IDS (Intrusion Detection Systems) using these rules
BillWu-Canada/Network-Intrusion-Detection-System
This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monitoring program and output any detected attacks
rahulvigneswaran/Intrusion-Detection-Systems
This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security".
trstringer/remote-jobs-hiring-without-whiteboards
:bulb: Intersection of the two famous lists for remote-jobs and hiring-without-whiteboards
poteto/hiring-without-whiteboards
⭐️ Companies that don't have a broken hiring process