Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View windyarya's full-sized avatar

Block or report windyarya

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A tool to help forensicate offline docker acquisitions

Python 548 45 Updated Oct 4, 2024

⭐️ A curated list of awesome forensic analysis tools and resources

4,737 696 Updated Nov 23, 2025

Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifyin…

1,096 109 Updated Dec 19, 2025

😱 A curated list of amazingly awesome OSINT

23,983 3,337 Updated Dec 13, 2025

A list of free and open forensics analysis tools and other resources

1,881 251 Updated Apr 20, 2025

Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.

Python 2,355 263 Updated Jan 4, 2024

Get up and running with OpenAI gpt-oss, DeepSeek-R1, Gemma 3 and other models.

Go 157,904 13,967 Updated Dec 19, 2025

Your Everyday Threat Intelligence

Python 1,940 312 Updated Nov 6, 2025

IntelOwl: manage your Threat Intelligence at scale

Python 4,381 523 Updated Dec 19, 2025

APTnotes data

1,765 289 Updated Dec 16, 2024

Indicators of Compromise

Python 242 39 Updated Dec 17, 2025

Sophos-originated indicators-of-compromise from published reports

YARA 643 118 Updated Dec 8, 2025

A collection of sources of indicators of compromise.

Shell 933 118 Updated May 8, 2025

Interesting APT Report Collection And Some Special IOCs

Python 2,796 544 Updated Dec 18, 2025

Indicators from Unit 42 Public Reports

PHP 728 153 Updated Aug 17, 2025

Indicators of Compromises (IOC) of our various investigations

YARA 1,897 278 Updated Dec 18, 2025

The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security professionals in cyber defense and intelligence.

Python 66 10 Updated May 19, 2024

List of awesome reverse engineering resources

9,812 1,139 Updated Jul 29, 2023

Cyber Threat Intelligence Repository expressed in STIX 2.0

1,998 458 Updated Dec 18, 2025

A collection of various awesome lists for hackers, pentesters and security researchers

102,883 9,789 Updated Jan 18, 2025

🎓 Because Education should be free. Contributions welcome! 🕵️

2,621 256 Updated Aug 9, 2025

A curated list of awesome Android Reverse Engineering training, resources, and tools.

1,403 128 Updated Jul 8, 2025

:octocat: Machine Learning for Cyber Security

7,941 1,842 Updated Aug 19, 2024

PhD/MSc course on Machine Learning Security (Univ. Cagliari)

Jupyter Notebook 222 25 Updated Dec 18, 2025

An overview of LLMs for cybersecurity.

1,156 122 Updated Dec 4, 2025

Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

C 14,279 2,088 Updated Dec 19, 2025

Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders

JavaScript 954 117 Updated Oct 5, 2023

teler-waf is a Go HTTP middleware that protects local web services from OWASP Top 10 threats, known vulnerabilities, malicious actors, botnets, unwanted crawlers, and brute force attacks.

Go 395 34 Updated Mar 18, 2025

Go bindings for liboqs

Go 114 35 Updated Feb 4, 2025

A curated list of Awesome Threat Intelligence resources

9,509 1,634 Updated Dec 15, 2025
Next