finds publicly known security vulnerabilities in a website's frontend JavaScript libraries
created at Oct. 5, 2019, 10:52 a.m.
Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
created at July 3, 2022, 1:41 p.m.
Curiefense is a unified, open source platform protecting cloud native applications.
created at Oct. 27, 2020, 4:53 p.m.
open-appsec is a machine learning security engine that preemptively and automatically prevents threats against Web Application & APIs. This repo include the main code and logic.
created at Oct. 26, 2022, 4:15 p.m.
A curated list of awesome resources about Electron.js (in)security
created at June 1, 2020, 10:02 a.m.
Keyscope is a key and secret workflow (validation, invalidation, etc.) tool built in Rust
created at Oct. 1, 2021, 12:01 p.m.
A collection of fascinating and bizarre Censys Search Queries
created at Aug. 16, 2022, 4:52 p.m.
Static Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on a agile and easy to implement software inside your DevOps pipeline. Support the following technologies: Java (Maven and Android), Kotlin (Android), Swift (iOS), .NET Full Framework, C#, and Javascript (Node.js).
created at Nov. 12, 2019, 8:07 p.m.
Open Source SIEM (Security Information and Event Management system).
created at Jan. 12, 2018, 11:40 p.m.
Swiss army knife for identifying and fingerprinting Android devices. MIT license, no restrictions on usage in production.
created at Oct. 20, 2020, 2:46 p.m.
Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.
created at Feb. 1, 2017, 1:24 p.m.
A collection of awesome videos, articles, books and resources about ARM exploitation.
created at June 30, 2019, 3:09 p.m.
Code Scanning/SAST/Static Analysis/Linting using many tools/Scanners + OpenAI GPT with One Report (Code, IaC) - Betterscan Community Edition (CE)
created at Jan. 31, 2022, 2:28 p.m.
A daily updated summary of the most frequent types of security advisories currently being reported from different sources.
created at Feb. 15, 2022, 3:06 p.m.
Discover internet-wide misconfigurations while drinking coffee
created at March 3, 2021, 6:47 p.m.
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.
created at May 27, 2019, 4:38 p.m.