A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
created at Feb. 8, 2018, 11:30 a.m.
Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attacks
created at Feb. 1, 2022, 6:34 a.m.
Hadoop library to read packet capture (PCAP) files
created at Oct. 2, 2011, 12:59 p.m.
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
created at Nov. 14, 2016, 4:23 p.m.
Dig Vulnerabilities in the BlackBox
created at Oct. 22, 2019, 1:19 a.m.
Easy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms.
created at May 6, 2015, 1:25 p.m.
Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.
created at Sept. 19, 2018, 9:04 a.m.
A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.
created at July 15, 2020, 2:11 a.m.
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
created at Aug. 2, 2016, 9:01 p.m.
Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and glibc as a dynamic library for use on other Linux-based platforms. It will gain more portability / integration over time.
created at Aug. 23, 2018, 4:43 a.m.
Find secrets and passwords in container images and file systems
created at Aug. 22, 2020, 5:43 a.m.