A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
β18Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for awesome-security
Users that are interested in awesome-security are comparing it to the libraries listed below
Sorting:
- π¨ Quick tool to finds and extract email addresses from a body of textβ12Apr 15, 2023Updated 2 years ago
- π₯οΈ A reveal.js website for presenting the cyber security basics to humansβ35Apr 15, 2023Updated 2 years ago
- π Just a quick app, for learning the countries, their capital cities, flags and other infoβ52Apr 15, 2023Updated 2 years ago
- π A complete user system written in PHPβ16Dec 6, 2022Updated 3 years ago
- API to fetch trending GitHub repos. Hosted on Heroku - Free to use, CORS-enabled and no auth required.β11Oct 28, 2023Updated 2 years ago
- π¨ A customizable personal dashboard with a focus on speed, simplicity and security. β οΈ Depricated, see Dashy: https://github.com/Lissy9β¦β10Jul 16, 2021Updated 4 years ago
- π A web presentation for explaining secure coding best practicesβ25Jun 16, 2023Updated 2 years ago
- π Frictionless and anonymouse feedback system for agile teamsβ15Jul 3, 2022Updated 3 years ago
- An astronomical collection of space-related cybersecurity tools πβ¨β25Jul 9, 2023Updated 2 years ago
- π Safely charge your phone in public places without the worry of it being stolenβ50Nov 21, 2022Updated 3 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Developmentβ12May 29, 2017Updated 8 years ago
- A collection of awesome penetration testing resources, tools and other shiny thingsβ17Feb 11, 2017Updated 9 years ago
- π A minimal conky configuration to show real-time system resource usage on Linuxβ18Dec 2, 2022Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.β10Jun 13, 2018Updated 7 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for tβ¦β15Jun 3, 2016Updated 9 years ago
- A curated list of awesome social engineering resources.β14May 29, 2017Updated 8 years ago
- A curated list of awesome forensic analysis tools and resourcesβ16Oct 3, 2018Updated 7 years ago
- π The homepage for Alicia Sykesβ19Dec 9, 2023Updated 2 years ago
- πΈ A script which removes flashes from a video streamβ26Oct 11, 2023Updated 2 years ago
- A curated list of amazingly awesome OSINTβ66Jul 25, 2023Updated 2 years ago
- A curated list of Awesome Threat Intelligence resourcesβ19Mar 27, 2019Updated 6 years ago
- A curated list of awesome threat detection and hunting resourcesβ20Apr 13, 2019Updated 6 years ago
- π³ Small Docker container to sniff the traffic of any other Docker container with tcpdumpβ14Jul 16, 2022Updated 3 years ago
- βοΈ My Ansible playbooks and roles that I use to automate the configuration and management of all my serversβ43May 7, 2025Updated 10 months ago
- β11May 30, 2021Updated 4 years ago
- Google Chrome Extension that shows the latest news from GCUF Websiteβ19Nov 4, 2014Updated 11 years ago
- Saltstack formula for wireguardβ11Dec 22, 2025Updated 3 months ago
- An Angular JS application that lets you tour around the globe ..free of cost ;-)β14Dec 26, 2015Updated 10 years ago
- Beautiful directory theme collections developed using Asp.Net Core 2.2 For your listings related projects. Azure online demo available.β10Feb 13, 2019Updated 7 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!β10Aug 2, 2020Updated 5 years ago
- β14Dec 3, 2020Updated 5 years ago
- Phishing can't get any easier with Tilapiaβ11Jan 2, 2023Updated 3 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I hβ¦β11Jul 16, 2022Updated 3 years ago
- Work with IPv4 in netboxβ16May 8, 2024Updated last year
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations andβ¦β10Oct 12, 2019Updated 6 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.β11Nov 26, 2022Updated 3 years ago
- 128T Product Docsβ11Updated this week
- Harden Kasm Workspaces deployments with DISA STIGsβ18Nov 17, 2025Updated 4 months ago
- β10Jan 18, 2023Updated 3 years ago