Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Top 23 cyber Open-Source Projects
-
pyWhat
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
Name-That-Hash
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
-
Hacking-Windows
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
-
cherrybomb
Stop half-done APIs! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by auditing your API specifications, validating them and running API security tests.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
Windows-Optimize-Harden-Debloat
Enhance the security and privacy of your Windows 10 and Windows 11 deployments with our fully optimized, hardened, and debloated script. Adhere to industry best practices and Department of Defense STIG/SRG requirements for optimal performance and security.
-
FunctionStomping
Shellcode injection technique. Given as C++ header, standalone Rust program or library.
-
infoooze
A OSINT tool which helps you to quickly find information effectively. All you need is to input and it will take take care of rest.
-
Venom
Venom is a library that meant to perform evasive communication using stolen browser socket (by Idov31)
-
MrKaplan
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.
-
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
-
Go-Hacking
A FREE comprehensive online Go hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Golang from scratch.
-
Hacking-Rust
A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Rust from scratch.
-
turbo-scanner
A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts's ip or fqdn with the sole purpose of testing your own network to ensure there are no malicious services running.
-
TireFire
Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortable GUI-ish platform. Great for OSCP/HTB type Machines as well as penetration testing.
-
Embedded-Hacking
A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Project mention: Cherrybomb: Audit, validate and test API specifications | news.ycombinator.com | 2023-11-22
Project mention: Hacking Rust - new free book under development, reverse engineering Rust binaries | /r/ReverseEngineering | 2023-05-08
Project mention: A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering. | /r/bag_o_news | 2023-10-18
cyber related posts
- Cherrybomb: Audit, validate and test API specifications
- Windows Exploit Protection Manager
- would FW software run on a device like this?
- Firewalla Advice for a small business
- Does the VPN client terminate "inside/behind" the firewall or in front of it?
- A custom GPT based on Andrej Karpathy's Zero To Hero utilizing tiktoken with the intent to augment AI Transformer-model education and reverse engineer GPT models from scratch.
- A custom GPT based on Andrej Karpathy's Zero To Hero utilizing tiktoken with the intent to augment AI Transformer-model education and reverse engineer GPT models from scratch.
-
A note from our sponsor - InfluxDB
www.influxdata.com | 26 Apr 2024
Index
What are some of the best open-source cyber projects? This list will help you:
Project | Stars | |
---|---|---|
1 | pyWhat | 6,352 |
2 | opencti | 4,701 |
3 | BruteShark | 2,908 |
4 | Name-That-Hash | 1,413 |
5 | digital-forensics-lab | 1,382 |
6 | Hacking-Windows | 1,254 |
7 | cherrybomb | 1,042 |
8 | Windows-Optimize-Harden-Debloat | 1,015 |
9 | chepy | 831 |
10 | haiti | 704 |
11 | FunctionStomping | 669 |
12 | infoooze | 596 |
13 | firewalla | 523 |
14 | Venom | 360 |
15 | CyberPhish | 323 |
16 | MrKaplan | 247 |
17 | rawsec-cybersecurity-inventory | 238 |
18 | Go-Hacking | 170 |
19 | Hacking-Rust | 150 |
20 | turbo-scanner | 140 |
21 | TireFire | 138 |
22 | TypeDB CTI | 134 |
23 | Embedded-Hacking | 103 |
Sponsored