Skip to content
View wajihyassine's full-sized avatar
  • Google
  • San Francisco

Organizations

@google @GoogleCloudPlatform @googleapis @googleprivate

Block or report wajihyassine

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Beta Lists are currently in beta. Share feedback and report bugs.
Showing results

Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.

Python 856 123 Updated Oct 8, 2024

A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

Jinja 2,114 352 Updated Oct 15, 2024

A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalone or with other job schedulers like Nomad.

Go 319 15 Updated Oct 1, 2024

Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracting the malware's final stage configuration.

C# 122 1 Updated Sep 21, 2024

A recon tool that uses AI to predict subdomains. Then returns those that resolve.

Python 30 Updated Aug 18, 2024

Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password strings, vulnerabilities, etc.

Python 137 38 Updated Apr 10, 2024

Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.

Rust 2,254 199 Updated Oct 14, 2024

Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providing a realistic environment for hands-on drone hacking.

JavaScript 108 18 Updated Aug 28, 2024

Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.

Shell 47,124 2,568 Updated Oct 14, 2024

This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be exfiltrated out. A powerful Browser Stealer

C 145 23 Updated Sep 19, 2024

Dump cookies and credentials directly from Chrome/Edge process memory

C 1,013 100 Updated Sep 18, 2024

Tools and scripts to deploy and manage OpenRelik instances

Shell 8 1 Updated Oct 11, 2024

A Caldera plugin for the emulation of complete, realistic cyberattack chains.

Python 33 Updated Sep 19, 2024

JFFS2 filesystem extraction tool

Python 319 117 Updated May 5, 2023

Indicators from Amnesty International's investigations

Python 1,552 175 Updated May 2, 2024

HookChain: A new perspective for Bypassing EDR Solutions

C 361 57 Updated Aug 28, 2024

This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.

122 20 Updated Feb 17, 2023

AI-powered ffuf wrapper

Python 249 37 Updated Aug 22, 2024

Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!

1,407 184 Updated Oct 7, 2024

When good OAuth apps go rogue. Documents observed OAuth application tradecraft

TypeScript 41 7 Updated Oct 7, 2024

Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.

Python 1,935 324 Updated Oct 9, 2024

Test & Compare different Kubernetes security offerings on EKS, GKE and AKS

HCL 29 2 Updated Aug 29, 2024

Open source templates you can use to bootstrap your security programs

443 56 Updated Oct 7, 2024

A resource containing all the tools each ransomware gangs uses

695 69 Updated Oct 2, 2024

Umami is a simple, fast, privacy-focused alternative to Google Analytics.

TypeScript 22,297 4,158 Updated Oct 15, 2024

AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.

CSS 71 28 Updated Sep 9, 2024

Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )

Python 121 10 Updated Sep 4, 2024

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 57,578 23,831 Updated Oct 15, 2024

This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitab…

Python 71 23 Updated Oct 14, 2024
Next