This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to afford adequate security. We are firm believers that everyone deserves to be secure at a cost effective rate.
☆49May 15, 2020Updated 5 years ago
Alternatives and similar repositories for Open-Source-Security-List-
Users that are interested in Open-Source-Security-List- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- ☆19Nov 23, 2022Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Python3 Ebowla... 3Bowla☆17Jan 7, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A Python Typer-based CLI tool to generate fake data for Azure AD. AzDummy also uses Rich for some dope console output.☆13Apr 27, 2021Updated 4 years ago
- ☆22Jul 27, 2020Updated 5 years ago
- ☆14May 30, 2018Updated 7 years ago
- ☆13Aug 13, 2019Updated 6 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆44Oct 6, 2022Updated 3 years ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆25Apr 1, 2024Updated last year
- Exports MISP events to STIX and ingest into McAfee ESM☆15Feb 12, 2020Updated 6 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Converts NDJSON to JSON☆19Apr 2, 2021Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Dec 11, 2020Updated 5 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 6 months ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆29Jan 11, 2023Updated 3 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- MISP trainings, threat intel and information sharing training materials with source code☆427Dec 17, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- graffiti sends ASCII-art texts to remote webserver logs using consecutive 404 errors☆35Aug 13, 2019Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- A gc and wii homebrew app to that sends a binary to the GBA using the different multiboot protocol used by the third generation of Pokémo…☆17Feb 26, 2017Updated 9 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- New continually changing MAC spoofer concept to thwart trackers; randomizes mac address at random times) prevents WIFI access point locat…☆17Jul 2, 2021Updated 4 years ago
- scrapin' proxies with ocr☆19Jun 19, 2018Updated 7 years ago
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- A collection of cybersecurity challenges from the CTF Wastelands organized by Interlogica, featuring Docker-based deployment and comprehe…☆13Jul 12, 2024Updated last year
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- Ruby Regular Expression Helper Gem☆17Oct 30, 2016Updated 9 years ago
- find where an image is taken☆18Jul 14, 2022Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago