CaledoniaProject / awesome-opensource-security
A list of interesting open-source security tools, mostly reviewed and commented by me.
☆574Updated last week
Alternatives and similar repositories for awesome-opensource-security:
Users that are interested in awesome-opensource-security are comparing it to the libraries listed below
- Collaborative Malware Analysis Platform at Scale☆740Updated last week
- List of Awesome Advanced Windows Exploitation References☆1,476Updated 3 years ago
- Repository for information about 0-days exploited in-the-wild.☆781Updated this week
- Sandbox for automated Linux malware analysis.☆478Updated last year
- A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs.☆832Updated last month
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆707Updated 2 years ago
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆363Updated last year
- [Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For e…☆465Updated 5 years ago
- awesome-linux-rootkits☆1,798Updated 2 months ago
- Awesome Burp Suite Resources. 400+ open source Burp plugins, 400+ posts and videos.☆1,025Updated 5 years ago
- Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.☆630Updated 5 years ago
- Interesting APT Report Collection And Some Special IOC☆2,523Updated this week
- awesome list of browser exploitation tutorials☆2,119Updated last year
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,177Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,407Updated 6 months ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆921Updated 3 months ago
- Proofs-of-concept☆787Updated 6 months ago
- Open Source EDR for Windows☆1,195Updated 2 years ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,609Updated 9 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆568Updated this week
- IDApython Scripts for Analyzing Golang Binaries☆618Updated 7 months ago
- A curated list of awesome Fuzzing(or Fuzz Testing) for software security☆873Updated last year
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,305Updated 4 months ago
- ✍️ A curated list of CVE PoCs.☆3,371Updated 3 years ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆597Updated 2 months ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,182Updated 4 years ago
- My curated list of awesome links, resources and tools on infosec related topics☆1,094Updated 3 weeks ago
- Extract and aggregate threat intelligence.☆851Updated last year
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,100Updated 8 months ago
- A collection of sources of indicators of compromise.☆840Updated 5 months ago