Stars
🧑🚀 An identity and access management (IAM) infrastructure with authentication, authorization, MFA, SSO, user management, and multi-tenancy features. Supports OAuth 2.0, OIDC, and SAML. No framewor…
A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters to share knowledge, collaborate on techniques, and advance t…
Making Docker and Kubernetes management easy.
Digital Forensics artifact repository
This repository serves as a place for community created Targets and Modules for use with KAPE.
French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.
Interesting APT Report Collection And Some Special IOC
Detect Tactics, Techniques & Combat Threats
Indicators of Compromise from Amnesty International's cyber investigations
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
certsocietegenerale / yeti
Forked from yeti-platform/yetiYour Everyday Threat Intelligence
Open Cyber Threat Intelligence Platform
Outlook add-in companion to report suspicious mail easily
cozcan / TP_Election
Forked from MosesSamPaul/KamalRajniElectionAn Election Dapp
WiFi keylogger with Micro SD slot, based on the Atmega32U4 microcontroller and the ESP32-PICO module
Indicator of Compromise Scanner for CVE-2019-19781
Creating a simple neural network in Python with one input layer (3 inputs) and one output neuron.
Perform advanced MiTM attacks on websites with ease 💉
ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
DIY Arduino Wi-Fi Keylogger (Proof of Concept)
Automated Security Testing For REST API's
LuLu is the free open-source macOS firewall