cyber-security
There are 1166 repositories under cyber-security topic.
mytechnotalent/Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
jivoi/awesome-ml-for-cybersecurity
:octocat: Machine Learning for Cyber Security
decalage2/awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
Hack-with-Github/Free-Security-eBooks
Free Security and Hacking eBooks
intelowlproject/IntelOwl
IntelOwl: manage your Threat Intelligence at scale
Security-Onion-Solutions/securityonion
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
A-poc/BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
aydinnyunus/Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Idov31/Nidhogg
Nidhogg is an all-in-one simple to use rootkit.
mikeroyal/Digital-Forensics-Guide
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
brootware/awesome-cyber-security-university
🎓 Because Education should be free. Contributions welcome! 🕵️
fabionoth/awesome-cyber-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
SofianeHamlaoui/Lockdoor-Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
payloadbox/xxe-injection-payload-list
🎯 XML External Entity (XXE) Injection Payload List
mikeroyal/Open-Source-Security-Guide
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
ckane/CS7038-Malware-Analysis
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
kernc/logkeys
:memo: :keyboard: A GNU/Linux keylogger that works!
Alfredredbird/tookie-osint
Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
AnasAboreeda/Penetration-Testing-Study-Notes
Penetration Testing notes, resources and scripts
ProbiusOfficial/SecToolKit
Cybersecurity tool repository / Wiki 收录常用 / 前沿 的CTF和渗透工具以及其 官方/使用 文档,致力于让每个工具都能发挥作用ww,不管你是萌新还是领域从业者希望你都能在这里找到适合你的工具或者获得一定的启发。
Aabyss-Team/ARL
ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
Idov31/Cronos
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
securityjoes/MasterParser
MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs
aydinnyunus/WifiPassword-Stealer
Get All Registered Wifi Passwords from Target Computer.
matamorphosis/Scrummage
The Ultimate OSINT and Threat Hunting Framework
tobor88/PowerShell-Red-Team
Collection of PowerShell functions a Red Teamer may use in an engagement
gh0x0st/Buffer_Overflow
Don't let buffer overflows overflow your mind
aydinnyunus/exifLooter
ExifLooter finds geolocation on all image urls and directories also integrates with OpenStreetMap
theahmadov/slash
The Slash OSINT Tool
theahmadov/NIVOS
NIVOS is a hacking tool that allows you to scan deeply , crack wifi, see people on your network. It applies to all linux operating systems. And it is improving every day, new packages are added. Thank You For Using NIVOS :> [NIVOS Created By NIVO Team]
Idov31/Venom
Venom is a library that meant to perform evasive communication using stolen browser socket
security-cheatsheet/wireshark-cheatsheet
Wireshark Cheat Sheet
Western-OC2-Lab/Intrusion-Detection-System-Using-Machine-Learning
Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGBoost, stacking, k-means, Bayesian optimization..)
h4m5t/Sec-Interview
Web安全工程师/信息安全工程师/渗透测试工程师 面试题库
Skiller9090/Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
sechelper/kunge-cybersecurity-learning
全网首创,坤哥网安学习法,最屌没有之一