A secure and easy-to-use store for your production secrets
created at Dec. 24, 2013, 12:31 a.m.
🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.
created at May 4, 2019, 7 p.m.
A curated list of resources related to Industrial Control System (ICS) security.
created at Sept. 27, 2016, 1:48 p.m.
a curated list of useful threat modeling resources
created at Nov. 30, 2018, 6:27 p.m.
Substation is a security analytics and data pipeline toolkit for the cloud (AWS) and more.
created at April 15, 2022, 2:23 p.m.
CLI utility and Python module for analyzing log files and other data.
created at Feb. 19, 2017, 8:31 p.m.
Awesome information for WebSockets security research
created at Nov. 10, 2021, 11:51 p.m.
List of Bluetooth BR/EDR/LE security resources
created at June 21, 2020, 6:27 p.m.
🔥 A fully open source audit logs service and embeddable UI easily deployed to your own Kubernetes cluster. Brought to you by replicated.com and boxyhq.com 🚀
created at Oct. 4, 2016, 1:51 p.m.
Distributed tcpdump for cloud native environments
created at March 25, 2022, 2:31 p.m.
Discover internet-wide misconfigurations while drinking coffee
created at March 3, 2021, 6:47 p.m.
A daily updated summary of the most frequent types of security advisories currently being reported from different sources.
created at Feb. 15, 2022, 3:06 p.m.
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.
created at May 27, 2019, 4:38 p.m.
Code Scanning/SAST/Static Analysis/Linting using many tools/Scanners + OpenAI GPT with One Report (Code, IaC) - Betterscan Community Edition (CE)
created at Jan. 31, 2022, 2:28 p.m.
A collection of fascinating and bizarre Censys Search Queries
created at Aug. 16, 2022, 4:52 p.m.