Lists (1)
Sort Name ascending (A-Z)
Stars
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
Web Application Firewall Testing Framework - Go version
Collection of awesome LLM apps with AI Agents and RAG using OpenAI, Anthropic, Gemini and opensource models.
JA4+ is a suite of network fingerprinting standards
A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev
A simple and visual DNS resolution CLI tool capable of exporting results to graphviz and PDF.
defaceTracker is a Python script that scrapes defacement information from Zone-Xsec and saves the data to CSV or JSON format. This script helps you gather historical website defacement data easily.
A curated list of Awesome Threat Intelligence resources
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
Check whether an IP address or hostname belongs to popular cloud providers
All Algorithms implemented in Python
A list of JARM hashes for different ssl implementations used by some C2/red team tools.
Small shim that allows AWS Cognito to talk to github (by providing an OpenID wrapper around the Github API)
Additional function for opensquat
Rich is a Python library for rich text and beautiful formatting in the terminal.
An opinionated list of awesome Python frameworks, libraries, software and resources.
A simple, high-throughput file client for mounting an Amazon S3 bucket as a local file system.
an awesome list of honeypot resources
Various DNS dumps (daily new domains, FQDNs, etc.)
Capture screenshots of websites from the command-line
The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonating legit domains and brands.
A repository of breaches of AWS customers