Stars
A tool to help forensicate offline docker acquisitions
⭐️ A curated list of awesome forensic analysis tools and resources
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifyin…
A list of free and open forensics analysis tools and other resources
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Get up and running with OpenAI gpt-oss, DeepSeek-R1, Gemma 3 and other models.
IntelOwl: manage your Threat Intelligence at scale
Sophos-originated indicators-of-compromise from published reports
A collection of sources of indicators of compromise.
Interesting APT Report Collection And Some Special IOCs
Indicators of Compromises (IOC) of our various investigations
The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security professionals in cyber defense and intelligence.
List of awesome reverse engineering resources
Cyber Threat Intelligence Repository expressed in STIX 2.0
A collection of various awesome lists for hackers, pentesters and security researchers
🎓 Because Education should be free. Contributions welcome! 🕵️
A curated list of awesome Android Reverse Engineering training, resources, and tools.
Machine Learning for Cyber Security
PhD/MSc course on Machine Learning Security (Univ. Cagliari)
An overview of LLMs for cybersecurity.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders
teler-waf is a Go HTTP middleware that protects local web services from OWASP Top 10 threats, known vulnerabilities, malicious actors, botnets, unwanted crawlers, and brute force attacks.
A curated list of Awesome Threat Intelligence resources