Lists (4)
Sort Name ascending (A-Z)
Stars
Red Team Cheatsheet in constant expansion.
Tools & Interesting Things for RedTeam Ops
List of Awesome Red Teaming Resources
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
A collection of essential and foundational cybersecurity knowledge, thoughtfully organized for easy comprehension.
Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather than network packets.
A commercial grade threat intelligence feed thats validated and updated every half hour.
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
grep rough audit - source code auditing tool
Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Application Security Testing (DAST).
Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps automate the vulnerability scanning of web applications. Eith…
REST/JSON API to the Burp Suite security tool.
Kibana Alert & Report App for Elasticsearch
Create actionable data from your Vulnerability Scans
A curated list of Awesome Threat Intelligence resources
Concourse CI assets for Compliance Toolkit
A project security/vulnerability/risk scanning tool
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
A repository with 3 tools for pwn'ing websites with .git repositories available
Automated All-in-One OS Command Injection Exploitation Tool.
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to invest…
BDD Automated Security Tests for Web Applications