#c_lang #binary_exploitation #cheatsheet #crypto #cryptography #cryptohack #ctf #ctf_challenges #ctf_tools #ctf_writeups #cybersecurity #hackthebox #learning #pentesting #pwn #resources #reverse_engineering #reversing #ssti #steganography #tryhackme
https://github.com/Adamkadaban/CTFs
https://github.com/Adamkadaban/CTFs
GitHub
GitHub - Adamkadaban/CTFs: CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done - Adamkadaban/CTFs
#shell #attack_surface #attack_surface_management #attacksurface #bugbounty_platform #cybersecurity #hacking #hacking_tools #osint_framework #osint_tool #penetration_testing #pentest_scripts #pentest_tool #pentest_tools #pentesting #pentesting_tools #security #security_tools #sn1per #sn1per_professional
https://github.com/1N3/Sn1per
https://github.com/1N3/Sn1per
GitHub
GitHub - 1N3/Sn1per: Attack Surface Management Platform
Attack Surface Management Platform. Contribute to 1N3/Sn1per development by creating an account on GitHub.
#python #blueteam #bugbounty #cheatsheet #credentials_gathering #cybersecurity #default_password #exploit #infosec #offensive_security #pentest #pentesting
https://github.com/ihebski/DefaultCreds-cheat-sheet
https://github.com/ihebski/DefaultCreds-cheat-sheet
GitHub
GitHub - ihebski/DefaultCreds-cheat-sheet: One place for all the default credentials to assist the Blue/Red teamers identifying…
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️ - ihebski/DefaultCreds-cheat-sheet
#html #cybersecurity #geoint #hacking #humint #osint #socmint #tools #toolset
https://github.com/cipher387/osint_stuff_tool_collection
https://github.com/cipher387/osint_stuff_tool_collection
GitHub
GitHub - cipher387/osint_stuff_tool_collection: A collection of several hundred online tools for OSINT
A collection of several hundred online tools for OSINT - cipher387/osint_stuff_tool_collection
#javascript #browser #chrome #cobrowsing #cybersecurity #e_ink #embeddable #multiplayer #proxy #proxy_server #rbi #remote_browser_isolation #remote_browsers #viewfinder #web_isolation #webrtc_video #zero_trust #zero_trust_network_access #zero_trust_security
https://github.com/BrowserBox/BrowserBox
https://github.com/BrowserBox/BrowserBox
GitHub
GitHub - BrowserBox/BrowserBox: 💚 Secure remote browsing anywhere.
💚 Secure remote browsing anywhere. . Contribute to BrowserBox/BrowserBox development by creating an account on GitHub.
#other #awesome #awesome_list #courses #curriculum #cyber_security #cybersecurity #education #educational_project #free #hacking #learning_by_doing
https://github.com/brootware/awesome-cyber-security-university
https://github.com/brootware/awesome-cyber-security-university
GitHub
GitHub - brootware/awesome-cyber-security-university: 🎓 Because Education should be free. Contributions welcome! 🕵️
🎓 Because Education should be free. Contributions welcome! 🕵️ - GitHub - brootware/awesome-cyber-security-university: 🎓 Because Education should be free. Contributions welcome! 🕵️
#python #bugbounty #cybersecurity #hacking #nuclei #penetration_testing #pentesting #reconnaissance #security #security_tools #vulnerability_scanners #web #webapplication #webappsecurity
https://github.com/gotr00t0day/Gsec
https://github.com/gotr00t0day/Gsec
GitHub
GitHub - gotr00t0day/Gsec: Web Security Scanner
Web Security Scanner. Contribute to gotr00t0day/Gsec development by creating an account on GitHub.
#other #awesome #awesome_list #bug_bounty #cybersecurity #forensics #hacking #incident_response #infosec #osint #penetration_testing #pentesting #reconnaissance #security #security_automation #security_tools
https://github.com/danieldurnea/FBI-tools
https://github.com/danieldurnea/FBI-tools
GitHub
GitHub - danieldurnea/FBI-tools: 🕵️ OSINT Tools for gathering information and actions forensics 🕵️
🕵️ OSINT Tools for gathering information and actions forensics 🕵️ - GitHub - danieldurnea/FBI-tools: 🕵️ OSINT Tools for gathering information and actions forensics 🕵️
❤1
#go #api_gateway #application_security #appsec #blueteam #bruteforce #captcha #cve #cybersecurity #firewall #hackers #http_flood #security #self_hosted #sql_injection #vulnerability #waf #web_application_firewall #web_security #websecurity #xss
SafeLine is a tool that helps keep your web applications safe from attacks. It acts like a shield between your website and the internet, filtering and blocking bad traffic. This protects your site from things like SQL injection, XSS, and other types of attacks. SafeLine also has features like rate limiting to stop too much traffic, anti-bot challenges to block bots, and dynamic protection to encrypt your HTML and JS codes. Using SafeLine makes your web apps more secure, which is important to protect your data and users.
https://github.com/chaitin/SafeLine
SafeLine is a tool that helps keep your web applications safe from attacks. It acts like a shield between your website and the internet, filtering and blocking bad traffic. This protects your site from things like SQL injection, XSS, and other types of attacks. SafeLine also has features like rate limiting to stop too much traffic, anti-bot challenges to block bots, and dynamic protection to encrypt your HTML and JS codes. Using SafeLine makes your web apps more secure, which is important to protect your data and users.
https://github.com/chaitin/SafeLine
GitHub
GitHub - chaitin/SafeLine: SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from…
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits. - chaitin/SafeLine
#cplusplus #analyzer #binary_analysis #c_plus_plus #cpp #cybersecurity #dark_mode #dear_imgui #disassembler #forensics #hacking #hacktoberfest #hex_editor #ips #mathematical_evaluator #multi_platform #pattern_language #preprocessor #reverse_engineering #static_analysis #windows
ImHex is a powerful hex editor designed for reverse engineers, programmers, and anyone who needs to work with binary data. It offers many features that make it useful and user-friendly. Here are the key benefits ImHex allows you to edit bytes, manage patches, undo and redo changes infinitely, and copy bytes in various formats. It also supports colorful highlighting, data display in different types (like integers, floats, colors), and decoding data in various encodings.
- **Custom Pattern Language** It has dark and light modes to protect your eyes, especially during late-night work sessions.
- **Data Analysis and Visualization** It supports various search methods (string, sequence, regex) and numerous hashing algorithms.
- **Modern Interface** ImHex works on Windows, macOS, and Linux, with options for web and nightly pre-release versions.
Overall, ImHex provides a comprehensive set of tools to make working with binary data efficient and comfortable.
https://github.com/WerWolv/ImHex
ImHex is a powerful hex editor designed for reverse engineers, programmers, and anyone who needs to work with binary data. It offers many features that make it useful and user-friendly. Here are the key benefits ImHex allows you to edit bytes, manage patches, undo and redo changes infinitely, and copy bytes in various formats. It also supports colorful highlighting, data display in different types (like integers, floats, colors), and decoding data in various encodings.
- **Custom Pattern Language** It has dark and light modes to protect your eyes, especially during late-night work sessions.
- **Data Analysis and Visualization** It supports various search methods (string, sequence, regex) and numerous hashing algorithms.
- **Modern Interface** ImHex works on Windows, macOS, and Linux, with options for web and nightly pre-release versions.
Overall, ImHex provides a comprehensive set of tools to make working with binary data efficient and comfortable.
https://github.com/WerWolv/ImHex
GitHub
GitHub - WerWolv/ImHex: 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3…
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM. - WerWolv/ImHex
#python #anssi #audit #bsi #cis #compliance #cybersecurity #dora #ebios_rm #fedramp #gdpr #grc #hipaa #isms #iso27001 #nis2 #nist #owasp #privacy #risk_management #soc2
CISO Assistant is a tool that helps manage cyber security and compliance. Here’s what you need to know:
- It separates compliance from cybersecurity controls, making it easier to manage.
- It includes built-in standards, security controls, and threat catalogs.
- You can assess risks and create remediation plans.
- It supports many frameworks like ISO 27001, NIST, GDPR, and more.
- You can use your own frameworks and manage audits, evidence collection, and reports.
Using CISO Assistant saves time by allowing you to reuse assessments, assess multiple frameworks at once, and automate reporting. It's developed by intuitem and has a free trial available. You can run it locally using Docker or join the community on Discord for support. This tool helps cyber security teams streamline their processes and reduce paperwork.
https://github.com/intuitem/ciso-assistant-community
CISO Assistant is a tool that helps manage cyber security and compliance. Here’s what you need to know:
- It separates compliance from cybersecurity controls, making it easier to manage.
- It includes built-in standards, security controls, and threat catalogs.
- You can assess risks and create remediation plans.
- It supports many frameworks like ISO 27001, NIST, GDPR, and more.
- You can use your own frameworks and manage audits, evidence collection, and reports.
Using CISO Assistant saves time by allowing you to reuse assessments, assess multiple frameworks at once, and automate reporting. It's developed by intuitem and has a free trial available. You can run it locally using Docker or join the community on Discord for support. This tool helps cyber security teams streamline their processes and reduce paperwork.
https://github.com/intuitem/ciso-assistant-community
GitHub
GitHub - intuitem/ciso-assistant-community: CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance…
CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports 100+ global frameworks with automatic control mappi...
👍1
#python #cybersecurity #sample_code
This repository helps you set up and use Microsoft Sentinel and Microsoft 365 Defender to secure your environment. It provides ready-to-use detections, queries, workbooks, and playbooks to help you find and stop threats. You can also contribute to the project by submitting new resources or fixing issues. The community welcomes your feedback and suggestions, making it easier for you to protect your system from threats. This tool is beneficial because it gives you powerful tools and a supportive community to enhance your security measures.
https://github.com/Azure/Azure-Sentinel
This repository helps you set up and use Microsoft Sentinel and Microsoft 365 Defender to secure your environment. It provides ready-to-use detections, queries, workbooks, and playbooks to help you find and stop threats. You can also contribute to the project by submitting new resources or fixing issues. The community welcomes your feedback and suggestions, making it easier for you to protect your system from threats. This tool is beneficial because it gives you powerful tools and a supportive community to enhance your security measures.
https://github.com/Azure/Azure-Sentinel
GitHub
GitHub - Azure/Azure-Sentinel: Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Cloud-native SIEM for intelligent security analytics for your entire enterprise. - Azure/Azure-Sentinel
#python #cli #cti #cybersecurity #forensics #hacktoberfest #information_gathering #infosec #linux #osint #pentesting #python #python3 #reconnaissance #redteam #sherlock #tools
Sherlock is a powerful tool that helps you find social media accounts by username across over 400 networks. It's easy to use and works on many operating systems like macOS, Linux, and Windows. You can install it using methods like `pipx` or Docker, and then simply type the username you want to search for. Sherlock will show you where that username is used on different social media platforms. This tool is useful for gathering information quickly and can be run locally or even online through services like Apify. It saves time and effort in finding accounts across many platforms.
https://github.com/sherlock-project/sherlock
Sherlock is a powerful tool that helps you find social media accounts by username across over 400 networks. It's easy to use and works on many operating systems like macOS, Linux, and Windows. You can install it using methods like `pipx` or Docker, and then simply type the username you want to search for. Sherlock will show you where that username is used on different social media platforms. This tool is useful for gathering information quickly and can be run locally or even online through services like Apify. It saves time and effort in finding accounts across many platforms.
https://github.com/sherlock-project/sherlock
GitHub
GitHub - sherlock-project/sherlock: Hunt down social media accounts by username across social networks
Hunt down social media accounts by username across social networks - sherlock-project/sherlock
👍1
#other #communityexchange #cybersecurity #ethical_hacking #hacktoberfest #learn
This 90-day cybersecurity study plan helps you build strong skills step-by-step, starting from basics like networking and security principles, then moving to Linux, Python, traffic analysis, Git, ELK stack, cloud platforms, and ethical hacking. It includes daily tasks, videos, tutorials, and practice exercises designed for beginners and professionals alike, even without prior experience. By following this plan, you gain hands-on experience, prepare for certifications like CompTIA Network+ and Security+, and develop confidence in real-world cybersecurity tools and techniques. This structured approach makes learning manageable and effective, helping you start or advance your cybersecurity career.
https://github.com/farhanashrafdev/90DaysOfCyberSecurity
This 90-day cybersecurity study plan helps you build strong skills step-by-step, starting from basics like networking and security principles, then moving to Linux, Python, traffic analysis, Git, ELK stack, cloud platforms, and ethical hacking. It includes daily tasks, videos, tutorials, and practice exercises designed for beginners and professionals alike, even without prior experience. By following this plan, you gain hands-on experience, prepare for certifications like CompTIA Network+ and Security+, and develop confidence in real-world cybersecurity tools and techniques. This structured approach makes learning manageable and effective, helping you start or advance your cybersecurity career.
https://github.com/farhanashrafdev/90DaysOfCyberSecurity
GitHub
GitHub - farhanashrafdev/90DaysOfCyberSecurity: This repository contains a 90-day cybersecurity study plan, along with resources…
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, ...
#python #cybersecurity #osint #pentesting #python
Blackbird is a powerful tool for finding usernames and emails across over 600 platforms. It uses AI to create profiles of users, helping you understand them better with less effort. The tool is free and easy to use, with features like smart filters and exports to PDF or CSV. You can search by username or email and get detailed results quickly. This helps users gather information efficiently and safely, without sharing sensitive data. It's useful for investigations and research, making it easier to find and analyze online profiles.
https://github.com/p1ngul1n0/blackbird
Blackbird is a powerful tool for finding usernames and emails across over 600 platforms. It uses AI to create profiles of users, helping you understand them better with less effort. The tool is free and easy to use, with features like smart filters and exports to PDF or CSV. You can search by username or email and get detailed results quickly. This helps users gather information efficiently and safely, without sharing sensitive data. It's useful for investigations and research, making it easier to find and analyze online profiles.
https://github.com/p1ngul1n0/blackbird
GitHub
GitHub - p1ngul1n0/blackbird: An OSINT tool to search for accounts by username and email in social networks.
An OSINT tool to search for accounts by username and email in social networks. - p1ngul1n0/blackbird
#other #bluetooth #bt #coding #cybersecurity #diy #electronics #esp32 #flashing #hacker #hacking #jammer #nrf24 #programming
The ESP32-BlueJammer is a device that disrupts all wireless signals operating on the 2.4 GHz frequency, including Bluetooth, BLE, WiFi, RC drones, and many smart gadgets. It uses an ESP32 chip combined with nRF24 modules to create noise and send unnecessary packets, effectively jamming these signals within a range of over 30 meters, which can be extended with better antennas or amplifiers. This jammer is intended strictly for educational and security testing purposes to help understand and improve wireless security. It is illegal to use for malicious purposes, so it should be handled responsibly and legally[1][2][3].
https://github.com/EmenstaNougat/ESP32-BlueJammer
The ESP32-BlueJammer is a device that disrupts all wireless signals operating on the 2.4 GHz frequency, including Bluetooth, BLE, WiFi, RC drones, and many smart gadgets. It uses an ESP32 chip combined with nRF24 modules to create noise and send unnecessary packets, effectively jamming these signals within a range of over 30 meters, which can be extended with better antennas or amplifiers. This jammer is intended strictly for educational and security testing purposes to help understand and improve wireless security. It is illegal to use for malicious purposes, so it should be handled responsibly and legally[1][2][3].
https://github.com/EmenstaNougat/ESP32-BlueJammer
GitHub
GitHub - EmenstaNougat/ESP32-BlueJammer: The ESP32-BlueJammer (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts 2.4GHz…
The ESP32-BlueJammer (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts 2.4GHz communications. Using an ESP32 and nRF24 modules, it generates noise and unnecessary packets, causing int...
#java #adversary_emulation #adversary_exposure_validation #aev #attack_simulation #breach_simulator #cybersecurity #purple_team
OpenBAS is a free, open-source platform that helps you plan and run cyberattack simulations to find security weaknesses in your organization. It supports teamwork, real-time monitoring, and detailed feedback, letting you test defenses against real-world threats using up-to-date intelligence from OpenCTI. You can simulate attacks through emails, SMS, social media, and more, making your training realistic and comprehensive. OpenBAS offers both a Community Edition and a more advanced Enterprise Edition. It’s easy to install with Docker or manually, and you can try it online before using it. This helps you improve your cybersecurity by practicing and identifying gaps before real attacks happen.
https://github.com/OpenBAS-Platform/openbas
OpenBAS is a free, open-source platform that helps you plan and run cyberattack simulations to find security weaknesses in your organization. It supports teamwork, real-time monitoring, and detailed feedback, letting you test defenses against real-world threats using up-to-date intelligence from OpenCTI. You can simulate attacks through emails, SMS, social media, and more, making your training realistic and comprehensive. OpenBAS offers both a Community Edition and a more advanced Enterprise Edition. It’s easy to install with Docker or manually, and you can try it online before using it. This helps you improve your cybersecurity by practicing and identifying gaps before real attacks happen.
https://github.com/OpenBAS-Platform/openbas
GitHub
GitHub - OpenAEV-Platform/openaev: Open Adversarial Exposure Validation Platform
Open Adversarial Exposure Validation Platform. Contribute to OpenAEV-Platform/openaev development by creating an account on GitHub.
🗿1
#python #artificial_intelligence #cybersecurity #generative_ai #llm #pentesting
Cybersecurity AI (CAI) is an open-source, lightweight framework that helps you build AI agents to find and fix security vulnerabilities efficiently. It supports many AI models and tools, works on multiple operating systems, and allows human control during tasks. CAI automates complex security testing steps like scanning, exploiting, and validating bugs, making bug bounty hunting easier and faster. It also logs detailed traces for better analysis and supports teamwork among AI agents. Using CAI can boost your cybersecurity skills, save time, and improve your ability to protect systems from attacks by combining AI power with your expertise.
https://github.com/aliasrobotics/cai
Cybersecurity AI (CAI) is an open-source, lightweight framework that helps you build AI agents to find and fix security vulnerabilities efficiently. It supports many AI models and tools, works on multiple operating systems, and allows human control during tasks. CAI automates complex security testing steps like scanning, exploiting, and validating bugs, making bug bounty hunting easier and faster. It also logs detailed traces for better analysis and supports teamwork among AI agents. Using CAI can boost your cybersecurity skills, save time, and improve your ability to protect systems from attacks by combining AI power with your expertise.
https://github.com/aliasrobotics/cai
GitHub
GitHub - aliasrobotics/cai: Cybersecurity AI (CAI), the framework for AI Security
Cybersecurity AI (CAI), the framework for AI Security - aliasrobotics/cai
❤1
#python #cybersecurity #fyp #hacking #hacking_tool #indonesia #information #information_gathering #ip_geolocation #linux #osint #osint_python #osint_tool #pentesting #phone_number #python #python_hacking #termux #termux_hacks #termux_tool
GhostTrack is a simple tool you can install on Linux or Termux to track locations, phone numbers, or social media usernames using open-source intelligence (OSINT). It offers menus for IP tracking (which can be combined with another tool called Seeker), phone number tracking, and username tracking on social media. This helps you gather information about a target’s location or identity easily. The benefit is that you can quickly find useful data for security, investigation, or personal knowledge without needing advanced skills, all through a straightforward Python-based program created by HunxByts.
https://github.com/HunxByts/GhostTrack
GhostTrack is a simple tool you can install on Linux or Termux to track locations, phone numbers, or social media usernames using open-source intelligence (OSINT). It offers menus for IP tracking (which can be combined with another tool called Seeker), phone number tracking, and username tracking on social media. This helps you gather information about a target’s location or identity easily. The benefit is that you can quickly find useful data for security, investigation, or personal knowledge without needing advanced skills, all through a straightforward Python-based program created by HunxByts.
https://github.com/HunxByts/GhostTrack
GitHub
GitHub - HunxByts/GhostTrack: Useful tool to track location or mobile number
Useful tool to track location or mobile number. Contribute to HunxByts/GhostTrack development by creating an account on GitHub.
#python #agents #artificial_intelligence #cybersecurity #generative_ai #llm #penetration_testing
Strix is a free, open-source tool that uses AI agents to automatically find and fix security problems in your apps by acting like real hackers—running your code, hunting for vulnerabilities, and proving they’re real by actually exploiting them, not just guessing[1][2]. It works fast, gives clear reports, and can even suggest fixes or create pull requests to help you secure your code quickly. You can run it on your own computer, in your development pipeline, or use a cloud version for easier setup. The main benefit is that you get thorough, real-world security testing without the slow pace and high cost of manual checks, helping you catch and fix issues before they become serious problems.
https://github.com/usestrix/strix
Strix is a free, open-source tool that uses AI agents to automatically find and fix security problems in your apps by acting like real hackers—running your code, hunting for vulnerabilities, and proving they’re real by actually exploiting them, not just guessing[1][2]. It works fast, gives clear reports, and can even suggest fixes or create pull requests to help you secure your code quickly. You can run it on your own computer, in your development pipeline, or use a cloud version for easier setup. The main benefit is that you get thorough, real-world security testing without the slow pace and high cost of manual checks, helping you catch and fix issues before they become serious problems.
https://github.com/usestrix/strix
GitHub
GitHub - usestrix/strix: Open-source AI agents for penetration testing
Open-source AI agents for penetration testing. Contribute to usestrix/strix development by creating an account on GitHub.