Infection Monkey - An open-source adversary emulation platform
updated at June 7, 2024, 1:58 a.m.
A collected list of awesome security talks
updated at June 7, 2024, 12:01 a.m.
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.
updated at June 7, 2024, midnight
Safely store secrets in Git/Mercurial/Subversion
updated at June 6, 2024, 9:05 p.m.
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
updated at June 6, 2024, 1:23 p.m.
Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attacks
updated at June 6, 2024, 8:50 a.m.
Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.
updated at June 5, 2024, 6:34 p.m.
A collection of awesome videos, articles, books and resources about ARM exploitation.
updated at June 5, 2024, 3:34 p.m.
Hadoop library to read packet capture (PCAP) files
updated at June 5, 2024, 7:17 a.m.
Keyscope is a key and secret workflow (validation, invalidation, etc.) tool built in Rust
updated at June 4, 2024, 1:30 a.m.
A collection of OSX and iOS security resources
updated at June 3, 2024, 9:45 p.m.