Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Top 23 cyber-security Open-Source Projects
-
Reverse-Engineering-Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
-
securityonion
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
-
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail. (by aydinnyunus)
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
Digital-Forensics-Guide
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
-
awesome-cyber-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
-
Lockdoor-Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
-
Open-Source-Security-Guide
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
-
CS7038-Malware-Analysis
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
-
tookie-osint
Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
-
Cronos
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners. (by Idov31)
-
exifLooter
ExifLooter finds geolocation on all image urls and directories also integrates with OpenStreetMap
-
NIVOS
NIVOS is a hacking tool that allows you to scan deeply , crack wifi, see people on your network. It applies to all linux operating systems. And it is improving every day, new packages are added. Thank You For Using NIVOS :> [NIVOS Created By NIVO Team]
-
Venom
Venom is a library that meant to perform evasive communication using stolen browser socket (by Idov31)
-
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
-
Intrusion-Detection-System-Using-Machine-Learning
Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGBoost, stacking, k-means, Bayesian optimization..)
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Project mention: New embedded and Rust hacking tutorials added - For anyone that missed my last post. Kevin Thomas is my mentor. We are both working together to bring free and low cost resources to those who are looking to learn and don't have money for expensive bootcamps/certs. Please enjoy his free tutorials! | /r/ReverseEngineering | 2023-10-27
Project mention: Security Onion on Proxmox with Linux Bridges and LACP Bond | /r/homelab | 2023-06-11I'm trying to get Security Onion running in my lab on my Proxmox server. I'm having trouble getting my WAN traffic to my SO VM. My WAN comes in on VLAN 100 to my switch and goes to my router (Virtual VyOS on the same physical host). I have a ton of VMs and really don't want to move to OVS if I don't absolutely have to. I found this discussion which included some commands for getting SO working on a Linux bridge, but this didn't work for me. Probably because my environment is different. Does anybody have SO setup this way? If so, how did you do it?
Project mention: Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel. | /r/netsec | 2023-06-24This is not an exploit nor an example about how to write a driver and I didn't write anywhere about an exploit or how to write an driver. If you are looking for these kind of resources, feel free to check out my driver programming blog series "Lord of the Ring0" (and a talk that will be released soon! :) ): https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
If you're looking to learn on your own, try mikeroyal's digital forensics guide on Github. There's a lot of recommended resources there that'll speed you up. https://github.com/mikeroyal/Digital-Forensics-Guide
Tookie-OSINT is an advanced OSINT tool that searches for social media accounts based on the input username. Tookie has lots of options and settings and is currently in heavy development by our team so more features are to come. Tookie will now include more then just social media OSINT. Thanks for your time and thanks to everyone who made this possible. :D https://github.com/Alfredredbird/tookie-osint
cyber-security related posts
- Kviklet is now under MIT License
- Exiflooter has released on Black Arch Linux
- Alfred, an Advanced Osint Tool
- Alfred, an Advanced Osint Tool
- Code feedback?
- Alfred, an Advanced Osint Tool
- Alfred, a Advanced Osint Tool
-
A note from our sponsor - InfluxDB
www.influxdata.com | 25 Apr 2024
Index
What are some of the best open-source cyber-security projects? This list will help you:
Project | Stars | |
---|---|---|
1 | Reverse-Engineering-Tutorial | 9,973 |
2 | awesome-ml-for-cybersecurity | 6,769 |
3 | awesome-security-hardening | 4,935 |
4 | IntelOwl | 3,103 |
5 | securityonion | 2,819 |
6 | Keylogger | 1,923 |
7 | Nidhogg | 1,597 |
8 | awesome-cyber-security-university | 1,389 |
9 | Digital-Forensics-Guide | 1,335 |
10 | awesome-cyber-security | 1,314 |
11 | Lockdoor-Framework | 1,294 |
12 | Open-Source-Security-Guide | 850 |
13 | logkeys | 730 |
14 | CS7038-Malware-Analysis | 719 |
15 | tookie-osint | 594 |
16 | Cronos | 534 |
17 | Scrummage | 488 |
18 | PowerShell-Red-Team | 456 |
19 | exifLooter | 395 |
20 | NIVOS | 370 |
21 | Venom | 360 |
22 | Lucifer | 335 |
23 | Intrusion-Detection-System-Using-Machine-Learning | 320 |
Sponsored