Lists (1)
Sort Name ascending (A-Z)
Stars
A very in development/test of a chrome extension to see who is conducting what fingerprinting when you visit a website. use at own risk
TypeScript multi-agent framework — one runTeam() call from goal to result. Auto task decomposition, parallel execution. 3 dependencies, deploys anywhere Node.js runs.
An example ISMS created with Claude for a fictious organisation.
The samples referenced in my book, Evasive Malware (No starch Press)
Free educational content on reverse engineering and malware analysis from the FLARE team
Tool for solving BPF filters and crafting packets based on these.
MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. Integrate security testing and penetration testing into AI wor…
Terravision creates Professional Cloud Architecture Diagrams from your Terraform code automatically. Supports AWS, Google and Azure.
FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.
A Python package and CLI for parsing aggregate and forensic DMARC reports
Lightweight coding agent that runs in your terminal
Official Modding tools for Sins of a Solar Empire II. Provided by Ironclad Games and Stardock Entertainment.
Go HTTP client with browser-identical TLS/HTTP2 fingerprinting. Bypass bot detection by perfectly mimicking Chrome, Firefox, and Safari at the cryptographic level (JA3/JA4, Akamai fingerprint, head…
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
A sysmon configuration designed for monitoring RMM solutions from the LOLRMM framework on the OS Microsoft Windows. 10/11
A terminal application that simulates installing things but doesn't actually install anything
A Latex style and template for paper preprints (based on NIPS style)
A large collection of NES accuracy tests on a single NROM cartridge.
External monitoring for organization assets
RunPE implementation with multiple evasive techniques (2)
Actionable analytics designed to combat threats
wagov / IRM
Forked from certsocietegenerale/IRMIncident Response Methodologies 2022
Turn any webpage into structured data using LLMs
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potent…
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.