- Austin
- jrems.me
Stars
Shannon Lite is an autonomous, white-box AI pentester for web applications and APIs. It analyzes your source code, identifies attack vectors, and executes real exploits to prove vulnerabilities bef…
Blame someone else for your bad code.
An informational repo about hunting for adversaries in your IT environment.
A POC to implement Detection-as-Code with Terraform and Sumo Logic.
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifyin…
Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).
A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.
IAM Least Privilege Policy Generator
PostHog context assembly for AI agents and LLM tasks
Extensive doc library and project structure for spec-driven agent coding
Detect Tactics, Techniques & Combat Threats
🐬DeepChat - A smart assistant that connects powerful AI to your personal world
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
In-depth attack surface mapping and asset discovery
Master programming by recreating your favorite technologies from scratch.
A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.
The official repo for a project involving a crowdsourced DFIR book. The main purpose of this book is to give anyone interested an opportunity to write a chapter of a book to get their name out ther…
DBLab enables 🖖 database branching and ⚡️ thin cloning for any Postgres database and empowers DB testing in CI/CD. This optimizes database-related costs while improving time-to-market and software …
Declarative schema migrations with schema-as-code workflows
☁️ Securely connect anything with WireGuard® and manage all your networks from a single place.
Discover and watch the latest cybersecurity conference talks. A curated archive of public security conference content.