Starred repositories
CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspic…
Semgrep Pro Rules to ensure code using LLMs is following best practices
Runtime security enforcement and threat hunting engine for autonomous AI fleets. Build Swarm Detection & Response (SDR) platforms with Clawdstrike.
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
Security Scanner for Agent Skills
A self-hosted dashboard that puts all your feeds in one place
A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.
A Swiss army knife for your daily Linux network plumbing.
Curated collection of cybersecurity tools featured in Black Hat Arsenal events.
[DEPRECATED] Moved to microsoft/agent-governance-toolkit
Awesome hacking is an awesome collection of hacking tools.
Building 67 Projects ranging from beginner to advanced so anyone can — learn from, build upon, use as a reference, or even copy directly 🧙♂️
😈Awful AI is a curated list to track current scary usages of AI - hoping to raise awareness
An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.
Multiplex Thinking: Reasoning via Token-wise Branch-and-Merge
A comprehensive guide for enhancing security and privacy on iOS and iPadOS devices.
syzkaller is an unsupervised coverage-guided kernel fuzzer
ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.
A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.
Implement common use cases with Compose Multiplatform Navigation 3
Tools and Techniques for Blue Team / Incident Response
See what your AI agents can access. Scan MCP configs for exposed secrets, shadow APIs, and AI models. Generate AI-BOMs for compliance.
Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows
This repository contains the code and data for the paper "Chaining the Evidence: Robust Reinforcement Learning for Deep Search Agents with Citation-Aware Rubric Rewards".
AI Powered Knowledge Graph Generator