✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
updated at June 8, 2024, 9:32 a.m.
List of Bluetooth BR/EDR/LE security resources
updated at June 8, 2024, 8:56 a.m.
finds publicly known security vulnerabilities in a website's frontend JavaScript libraries
updated at June 8, 2024, 3:39 a.m.
Distributed tcpdump for cloud native environments
updated at June 8, 2024, 12:36 a.m.
Easy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms.
updated at June 8, 2024, midnight
A curated list of awesome YARA rules, tools, and people.
updated at June 7, 2024, 8:21 p.m.
Discover internet-wide misconfigurations while drinking coffee
updated at June 7, 2024, 7:32 p.m.
Go server for two-man rule style file encryption and decryption.
updated at June 7, 2024, 2:54 p.m.
A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.
updated at June 7, 2024, 2:24 p.m.
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
updated at June 7, 2024, 1:02 p.m.
A modern tool for Windows kernel exploration and tracing with a focus on security
updated at June 7, 2024, 3:20 a.m.