Lists (5)
Sort Name ascending (A-Z)
Starred repositories
Deobfuscate obfuscator.io, unminify and unpack bundled javascript
Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve clipboard contents, log keystrokes, bypass UAC and install AnyD…
A simple tool for bypassing file upload restrictions.
Demo environment to deploy Deep Discovery Inspector on AWS.
Neat IP Address Planner - NIPAP is the best open source IPAM in the known universe, challenging classical IP address management (IPAM) systems in many areas.
IP address space administration module of OpenWISP
An attempt to answer the age old interview question "What happens when you type google.com into your browser and press enter?"
Warning lists to inform users of MISP about potential false-positives or other information in indicators
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec and Audit Management and supporting 57 frameworks worldwide with auto-mapping: NIST CSF, ISO 27001, SOC2, CIS, PCI DSS, NIS2, CMMC,…
Free and source-available fair-code licensed workflow automation tool. Easily automate tasks across different services.
🔥 🔥 🔥 The Open Source Retool Alternative
How to systematically secure anything: a repository about security engineering
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Ralph is the CMDB / Asset Management system for data center and back office hardware.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Devika is an Agentic AI Software Engineer that can understand high-level human instructions, break them down into steps, research relevant information, and write code to achieve the given objective…
An open source real-time network topology and protocols analyzer
🕵️♂️ All-in-one OSINT tool for analysing any website
The Single Sign-On Multi-Factor portal for web apps
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
Coleccion de IRM de Societe Generale traducidos por mí al Español
Cyber Incident Response Team Playbook Battle Cards