Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems. Learn more →
Top 15 C Cybersecurity Projects
-
Suricata
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Project mention: The Impact of Open-Source Tools in Cyber Warfare: A Deep Dive | dev.to | 2025-03-06In summary, the open-source movement in cyber warfare has dismantled the long-held notion that only a select few can access and use cutting-edge cybersecurity tools. With resources like Suricata and Wireshark available at no cost, the barriers to entry have significantly decreased, allowing for both robust security defenses and increasingly complex cyber offensive strategies. The balance between offensive and defensive capabilities is delicate, and as new vulnerabilities are exploited, the need for innovative defense mechanisms becomes critical. For policymakers and cybersecurity professionals alike, the challenge lies in managing this dual-use dilemma. International collaborative efforts supported by initiatives such as open-source sponsorship are key to establishing a secure digital frontier, ensuring that open-source tools aid in cyber defense rather than contribute to cyber conflict.
-
InfluxDB
InfluxDB high-performance time series database. Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.
-
-
adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
-
Hacking-Windows
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
-
-
Cronos
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners. (by Idov31)
-
remote_hacker_probe
Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
-
CodeRabbit
CodeRabbit: AI Code Reviews for Developers. Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
-
Embedded-Hacking
A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
-
-
-
PANTHER
This tool presents a novel approach to bolstering network protocol verification by integrating the Shadow network simulator with the Ivy formal verification tool to check time properties. Furthermore, it extends Ivy’s capabilities with a dedicated time module, enabling the verification of complex quantitative-time properties. (by ElNiak)
-
-
ransomware
Ransomware basique écrit en C, conçu dans le cadre d'un projet en sécurité à des fins éducatives uniquement. (by 4zv4l)
-
-
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
C Cybersecurity discussion
C Cybersecurity related posts
-
Exclude certain CIS (sca) rules from agents
-
Deployment issue
-
Greenbone
-
Update vulnerability databases through proxy with authentication
-
💻 Introducing Wazuh 4.7.0.
-
What adversary emulation options are there nowadays to test SIEMs and IDSs?
-
Ignore Vulnerability for specific CVE?
-
A note from our sponsor - InfluxDB
influxdata.com | 25 Apr 2025
Index
What are some of the best open-source Cybersecurity projects in C? This list will help you:
# | Project | Stars |
---|---|---|
1 | Suricata | 5,182 |
2 | nDPI | 4,017 |
3 | adversary_emulation_library | 1,855 |
4 | Hacking-Windows | 1,411 |
5 | CTFs | 659 |
6 | Cronos | 579 |
7 | remote_hacker_probe | 251 |
8 | Embedded-Hacking | 144 |
9 | tsuki-sploit | 47 |
10 | jdvrif | 44 |
11 | PANTHER | 37 |
12 | 0x02-ARM-32-Hacking-Int | 11 |
13 | ransomware | 3 |
14 | battlewise | 1 |
15 | VDF4J | 1 |