Stars
CycloneDX CLI tool for SBOM analysis, merging, diffs and format conversions.
The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 350 common, vulnerable components (openssl, libpng, libxml2, expat and others),…
NAXSI is an open-source, high performance, low rules maintenance WAF for NGINX
SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System
Module to perform Mikrotik Routerboard Netinstall via Etherboot
A curated list of awesome NetBox resources
Plugin to load predefined data into Netbox
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.
Command and Conquer Tiberian Dawn
Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States’ appointed CSIRTs and CERT-EU.
The recursive internet scanner for hackers. 🧡
SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.
An awesome repository of local AI tools
EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.
The Dogtag Certificate System is an enterprise-class Certificate Authority (CA) which supports all aspects of certificate lifecycle management, including key archival, OCSP and smartcard management.
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
#1 Locally hosted web application that allows you to perform various operations on PDF files
Collection of Cyber Threat Intelligence sources from the deep and dark web