-
09:58
(UTC +05:45)
Stars
Investigate malicious Windows logon by visualizing and analyzing Windows event log
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Rapidly Search and Hunt through Windows Forensic Artefacts
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Malware🦠 Detection and Analysis using Machine Learning (MDAML) is designed to provide users with an intuitive interface for analyzing and detecting malware in various file formats.
From Chaos to Clarity. Turning Raw Windows Logs into Executive Insights. Looking for Indicators of Compromise.
LogWhisperer is a self-hosted, AI-powered log summarization tool for Linux servers.
An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for authorized cybersecurity research workflows.
A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
⭐️ A curated list of awesome forensic analysis tools and resources
The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.
Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security,…
Cybersecurity AI (CAI), the framework for AI Security
R-s0n / cloud_enum
Forked from initstring/cloud_enumMulti-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!
Fetch many paths for many hosts - without killing the hosts
A curated list of web3Security materials and resources For Pentesters and Bug Hunters.
Reproduce DeFi hacked incidents using Foundry.
This repository contains a comprehensive collection of learning resources and notes that I've gathered on various topics, including cybersecurity, bug bounty, API security, cloud security, and more…