GitHub Trends
10.1K subscribers
15.3K links
See what the GitHub community is most excited about today.

A bot automatically fetches new repositories from https://github.com/trending and sends them to the channel.

Author and maintainer: https://github.com/katursis
Download Telegram
#go #api_gateway #application_security #appsec #blueteam #bruteforce #captcha #cve #cybersecurity #firewall #hackers #http_flood #security #self_hosted #sql_injection #vulnerability #waf #web_application_firewall #web_security #websecurity #xss

SafeLine is a tool that helps keep your web applications safe from attacks. It acts like a shield between your website and the internet, filtering and blocking bad traffic. This protects your site from things like SQL injection, XSS, and other types of attacks. SafeLine also has features like rate limiting to stop too much traffic, anti-bot challenges to block bots, and dynamic protection to encrypt your HTML and JS codes. Using SafeLine makes your web apps more secure, which is important to protect your data and users.

https://github.com/chaitin/SafeLine
#cplusplus #analyzer #binary_analysis #c_plus_plus #cpp #cybersecurity #dark_mode #dear_imgui #disassembler #forensics #hacking #hacktoberfest #hex_editor #ips #mathematical_evaluator #multi_platform #pattern_language #preprocessor #reverse_engineering #static_analysis #windows

ImHex is a powerful hex editor designed for reverse engineers, programmers, and anyone who needs to work with binary data. It offers many features that make it useful and user-friendly. Here are the key benefits ImHex allows you to edit bytes, manage patches, undo and redo changes infinitely, and copy bytes in various formats. It also supports colorful highlighting, data display in different types (like integers, floats, colors), and decoding data in various encodings.
- **Custom Pattern Language** It has dark and light modes to protect your eyes, especially during late-night work sessions.
- **Data Analysis and Visualization** It supports various search methods (string, sequence, regex) and numerous hashing algorithms.
- **Modern Interface** ImHex works on Windows, macOS, and Linux, with options for web and nightly pre-release versions.

Overall, ImHex provides a comprehensive set of tools to make working with binary data efficient and comfortable.

https://github.com/WerWolv/ImHex
#python #anssi #audit #bsi #cis #compliance #cybersecurity #dora #ebios_rm #fedramp #gdpr #grc #hipaa #isms #iso27001 #nis2 #nist #owasp #privacy #risk_management #soc2

CISO Assistant is a tool that helps manage cyber security and compliance. Here’s what you need to know:

- It separates compliance from cybersecurity controls, making it easier to manage.
- It includes built-in standards, security controls, and threat catalogs.
- You can assess risks and create remediation plans.
- It supports many frameworks like ISO 27001, NIST, GDPR, and more.
- You can use your own frameworks and manage audits, evidence collection, and reports.

Using CISO Assistant saves time by allowing you to reuse assessments, assess multiple frameworks at once, and automate reporting. It's developed by intuitem and has a free trial available. You can run it locally using Docker or join the community on Discord for support. This tool helps cyber security teams streamline their processes and reduce paperwork.

https://github.com/intuitem/ciso-assistant-community
👍1
#python #cybersecurity #sample_code

This repository helps you set up and use Microsoft Sentinel and Microsoft 365 Defender to secure your environment. It provides ready-to-use detections, queries, workbooks, and playbooks to help you find and stop threats. You can also contribute to the project by submitting new resources or fixing issues. The community welcomes your feedback and suggestions, making it easier for you to protect your system from threats. This tool is beneficial because it gives you powerful tools and a supportive community to enhance your security measures.

https://github.com/Azure/Azure-Sentinel
#python #cli #cti #cybersecurity #forensics #hacktoberfest #information_gathering #infosec #linux #osint #pentesting #python #python3 #reconnaissance #redteam #sherlock #tools

Sherlock is a powerful tool that helps you find social media accounts by username across over 400 networks. It's easy to use and works on many operating systems like macOS, Linux, and Windows. You can install it using methods like `pipx` or Docker, and then simply type the username you want to search for. Sherlock will show you where that username is used on different social media platforms. This tool is useful for gathering information quickly and can be run locally or even online through services like Apify. It saves time and effort in finding accounts across many platforms.

https://github.com/sherlock-project/sherlock
👍1
#other #communityexchange #cybersecurity #ethical_hacking #hacktoberfest #learn

This 90-day cybersecurity study plan helps you build strong skills step-by-step, starting from basics like networking and security principles, then moving to Linux, Python, traffic analysis, Git, ELK stack, cloud platforms, and ethical hacking. It includes daily tasks, videos, tutorials, and practice exercises designed for beginners and professionals alike, even without prior experience. By following this plan, you gain hands-on experience, prepare for certifications like CompTIA Network+ and Security+, and develop confidence in real-world cybersecurity tools and techniques. This structured approach makes learning manageable and effective, helping you start or advance your cybersecurity career.

https://github.com/farhanashrafdev/90DaysOfCyberSecurity
#python #cybersecurity #osint #pentesting #python

Blackbird is a powerful tool for finding usernames and emails across over 600 platforms. It uses AI to create profiles of users, helping you understand them better with less effort. The tool is free and easy to use, with features like smart filters and exports to PDF or CSV. You can search by username or email and get detailed results quickly. This helps users gather information efficiently and safely, without sharing sensitive data. It's useful for investigations and research, making it easier to find and analyze online profiles.

https://github.com/p1ngul1n0/blackbird
#other #bluetooth #bt #coding #cybersecurity #diy #electronics #esp32 #flashing #hacker #hacking #jammer #nrf24 #programming

The ESP32-BlueJammer is a device that disrupts all wireless signals operating on the 2.4 GHz frequency, including Bluetooth, BLE, WiFi, RC drones, and many smart gadgets. It uses an ESP32 chip combined with nRF24 modules to create noise and send unnecessary packets, effectively jamming these signals within a range of over 30 meters, which can be extended with better antennas or amplifiers. This jammer is intended strictly for educational and security testing purposes to help understand and improve wireless security. It is illegal to use for malicious purposes, so it should be handled responsibly and legally[1][2][3].

https://github.com/EmenstaNougat/ESP32-BlueJammer
#java #adversary_emulation #adversary_exposure_validation #aev #attack_simulation #breach_simulator #cybersecurity #purple_team

OpenBAS is a free, open-source platform that helps you plan and run cyberattack simulations to find security weaknesses in your organization. It supports teamwork, real-time monitoring, and detailed feedback, letting you test defenses against real-world threats using up-to-date intelligence from OpenCTI. You can simulate attacks through emails, SMS, social media, and more, making your training realistic and comprehensive. OpenBAS offers both a Community Edition and a more advanced Enterprise Edition. It’s easy to install with Docker or manually, and you can try it online before using it. This helps you improve your cybersecurity by practicing and identifying gaps before real attacks happen.

https://github.com/OpenBAS-Platform/openbas
🗿1
#python #artificial_intelligence #cybersecurity #generative_ai #llm #pentesting

Cybersecurity AI (CAI) is an open-source, lightweight framework that helps you build AI agents to find and fix security vulnerabilities efficiently. It supports many AI models and tools, works on multiple operating systems, and allows human control during tasks. CAI automates complex security testing steps like scanning, exploiting, and validating bugs, making bug bounty hunting easier and faster. It also logs detailed traces for better analysis and supports teamwork among AI agents. Using CAI can boost your cybersecurity skills, save time, and improve your ability to protect systems from attacks by combining AI power with your expertise.

https://github.com/aliasrobotics/cai
1
#python #cybersecurity #fyp #hacking #hacking_tool #indonesia #information #information_gathering #ip_geolocation #linux #osint #osint_python #osint_tool #pentesting #phone_number #python #python_hacking #termux #termux_hacks #termux_tool

GhostTrack is a simple tool you can install on Linux or Termux to track locations, phone numbers, or social media usernames using open-source intelligence (OSINT). It offers menus for IP tracking (which can be combined with another tool called Seeker), phone number tracking, and username tracking on social media. This helps you gather information about a target’s location or identity easily. The benefit is that you can quickly find useful data for security, investigation, or personal knowledge without needing advanced skills, all through a straightforward Python-based program created by HunxByts.

https://github.com/HunxByts/GhostTrack
#python #agents #artificial_intelligence #cybersecurity #generative_ai #llm #penetration_testing

Strix is a free, open-source tool that uses AI agents to automatically find and fix security problems in your apps by acting like real hackers—running your code, hunting for vulnerabilities, and proving they’re real by actually exploiting them, not just guessing[1][2]. It works fast, gives clear reports, and can even suggest fixes or create pull requests to help you secure your code quickly. You can run it on your own computer, in your development pipeline, or use a cloud version for easier setup. The main benefit is that you get thorough, real-world security testing without the slow pace and high cost of manual checks, helping you catch and fix issues before they become serious problems.

https://github.com/usestrix/strix