C Cybersecurity

Open-source C projects categorized as Cybersecurity

Top 15 C Cybersecurity Projects

Cybersecurity
  1. Suricata

    Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.

    Project mention: The Impact of Open-Source Tools in Cyber Warfare: A Deep Dive | dev.to | 2025-03-06

    In summary, the open-source movement in cyber warfare has dismantled the long-held notion that only a select few can access and use cutting-edge cybersecurity tools. With resources like Suricata and Wireshark available at no cost, the barriers to entry have significantly decreased, allowing for both robust security defenses and increasingly complex cyber offensive strategies. The balance between offensive and defensive capabilities is delicate, and as new vulnerabilities are exploited, the need for innovative defense mechanisms becomes critical. For policymakers and cybersecurity professionals alike, the challenge lies in managing this dual-use dilemma. International collaborative efforts supported by initiatives such as open-source sponsorship are key to establishing a secure digital frontier, ensuring that open-source tools aid in cyber defense rather than contribute to cyber conflict.

  2. InfluxDB

    InfluxDB high-performance time series database. Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.

    InfluxDB logo
  3. nDPI

    Open Source Deep Packet Inspection Software Toolkit

  4. adversary_emulation_library

    An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

  5. Hacking-Windows

    A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.

  6. CTFs

    CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done

  7. Cronos

    PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners. (by Idov31)

  8. remote_hacker_probe

    Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.

  9. CodeRabbit

    CodeRabbit: AI Code Reviews for Developers. Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.

    CodeRabbit logo
  10. Embedded-Hacking

    A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.

  11. tsuki-sploit

    A USB-based script for Ethical hacking with multiple attacks

  12. jdvrif

    Steganography CLI & Web tool for concealing files within JPG images.

  13. PANTHER

    This tool presents a novel approach to bolstering network protocol verification by integrating the Shadow network simulator with the Ivy formal verification tool to check time properties. Furthermore, it extends Ivy’s capabilities with a dedicated time module, enabling the verification of complex quantitative-time properties. (by ElNiak)

  14. 0x02-ARM-32-Hacking-Int

    ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.

  15. ransomware

    Ransomware basique écrit en C, conçu dans le cadre d'un projet en sécurité à des fins éducatives uniquement. (by 4zv4l)

  16. battlewise

    battlewise (adj) : having knowledge or experience in battle

  17. VDF4J

    An implementation of Verifiable Delay Functions in Java

  18. SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
NOTE: The open source projects on this list are ordered by number of github stars. The number of mentions indicates repo mentiontions in the last 12 Months or since we started tracking (Dec 2020).

C Cybersecurity discussion

Log in or Post with

C Cybersecurity related posts

  • Exclude certain CIS (sca) rules from agents

    1 project | /r/Wazuh | 11 Dec 2023
  • Deployment issue

    1 project | /r/Wazuh | 11 Dec 2023
  • Greenbone

    1 project | /r/ITProTuesday | 8 Dec 2023
  • Update vulnerability databases through proxy with authentication

    3 projects | /r/Wazuh | 7 Dec 2023
  • 💻 Introducing Wazuh 4.7.0.

    1 project | /r/Wazuh | 6 Dec 2023
  • What adversary emulation options are there nowadays to test SIEMs and IDSs?

    1 project | /r/AskNetsec | 7 Nov 2023
  • Ignore Vulnerability for specific CVE?

    1 project | /r/Wazuh | 23 Aug 2023
  • A note from our sponsor - InfluxDB
    influxdata.com | 25 Apr 2025
    Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems. Learn more →

Index

What are some of the best open-source Cybersecurity projects in C? This list will help you:

# Project Stars
1 Suricata 5,182
2 nDPI 4,017
3 adversary_emulation_library 1,855
4 Hacking-Windows 1,411
5 CTFs 659
6 Cronos 579
7 remote_hacker_probe 251
8 Embedded-Hacking 144
9 tsuki-sploit 47
10 jdvrif 44
11 PANTHER 37
12 0x02-ARM-32-Hacking-Int 11
13 ransomware 3
14 battlewise 1
15 VDF4J 1

Sponsored
InfluxDB high-performance time series database
Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.
influxdata.com

Did you know that C is
the 6th most popular programming language
based on number of references?