Github

Explore 44 curated cybersecurity tools, with 17,495+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Crypto 101: the book Logo

An open-source introductory book about cryptography that provides educational content on fundamental cryptographic concepts and principles.

0
OWASP Testing Checklist v4 Markdown Logo

Markdown version of OWASP Testing Checklist v4 for various platforms.

0
CTF Write-ups 2013 Logo

A community-maintained archive of CTF write-ups and source files from cybersecurity competitions held in 2013.

0
bounty-targets-data Logo

A repository providing hourly-updated data dumps of bug bounty platform scopes from major platforms like HackerOne, Bugcrowd, and Intigriti for security researchers.

0
Detection and Response Pipeline Logo

A compilation of suggested tools for each component in a detection and response pipeline, with real-world examples, to design effective threat detection and response pipelines.

0
InvisibilityCloak Logo

InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.

0
Darkarmour Logo

Darkarmour is an open-source Windows antivirus evasion framework that enables security professionals to bypass antivirus detection through customizable obfuscation and anti-analysis techniques.

0
iam-lint Logo

A GitHub action that lints AWS IAM policy documents to identify security issues and misconfigurations with configurable severity levels and custom rules.

0
is-website-vulnerable Logo

A command-line tool that scans websites to detect publicly known security vulnerabilities in frontend JavaScript libraries using Snyk's vulnerability database.

0
CTF Write-ups Repository (2014) Logo

A collaborative repository of CTF write-ups and source files from 2014 competitions that allows community contributions to address scattered documentation issues.

0
RedGuard Logo

RedGuard is a C2 front flow control tool that helps evade detection by security systems through traffic filtering and redirection capabilities.

0
CTF Write-ups Repository (2016) Logo

A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.

0
Blackhat Conference Presentation Slides Logo

A repository providing centralized access to presentation slides from major cybersecurity conferences including Black Hat, Offensivecon, and REcon events.

0
Splunk SOAR Community Playbooks Logo

Repository of default playbooks and custom functions for Splunk SOAR instances with content migration to Splunk's GitHub.

0
June's Sophisticated npm Attack Attributed to North Korea Logo

A sophisticated npm attack attributed to North Korean threat actors, targeting technology firms and their employees.

0
shhgit Logo

A secrets detection tool that scans GitHub, GitLab, and Bitbucket repositories to identify API keys, access tokens, and other sensitive information in source code.

0
GitHub Logo

GitHub is a web-based platform that provides Git version control hosting and collaborative software development tools for managing code repositories and projects.

0
Protestware Open-Source Projects List Logo

A curated list documenting open-source projects that incorporate political protests in their software, ranging from messages to conditional malware.

0
Splunk SOAR Connectors Logo

Migrated Splunk SOAR Connectors to new GitHub organization for better organization and management.

0
LunaTrace Logo

LunaTrace is an open source supply chain security tool that monitors software dependencies for vulnerabilities and integrates with GitHub to notify developers of security issues before deployment.

0