Skip to content
View kam193's full-sized avatar
  • CERT.at

Sponsoring

@HerringtonDarkholme

Highlights

  • Pro

Block or report kam193

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Awesome list of keywords and artifacts for Threat Hunting sessions

PowerShell 529 60 Updated Feb 17, 2025

yara detection rules for hunting with the threathunting-keywords project

YARA 105 16 Updated Feb 4, 2025

Code zum Masterstudiengang IT-Security am FH-Campus Wien.

HTML 1 Updated Feb 13, 2025

Bring back Clippy on Windows 10/11!

C# 302 30 Updated Jul 6, 2023

Helper application for Linux distributions serving as a kind of "entry point" for running and integrating AppImages

C++ 6,034 273 Updated Feb 13, 2025

Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target system. By default, Vanir pulls up-to-date CVEs from Open Source V…

Python 322 26 Updated Feb 13, 2025

Snoopy Command Logger is a small library that logs all program executions on your Linux/BSD system.

C 1,239 159 Updated Oct 24, 2024

Automatically assess and score software repositories for supply chain risk.

Rust 98 8 Updated Feb 25, 2025

🧵 CLI tool for directly patching container images!

Go 1,133 74 Updated Feb 24, 2025

A new kind of Progress Bar, with real-time throughput, ETA, and very cool animations!

Python 5,713 211 Updated Oct 26, 2024

Deep Linux runtime visibility meets Wireshark

C 278 13 Updated Feb 3, 2025

Linux Runtime Security and Forensics using eBPF

Go 3,768 432 Updated Feb 25, 2025

"Can I take over DNS?" — a list of DNS providers and how to claim vulnerable domains.

1,017 95 Updated Sep 5, 2024

Indexes open directories

C# 1,188 95 Updated Feb 20, 2025

Open Source Package Analysis

Go 820 55 Updated Feb 1, 2025

Streamlit — A faster way to build and share data apps.

Python 37,774 3,256 Updated Feb 26, 2025

An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRIDE methodology.

Python 595 182 Updated Feb 7, 2025

FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).

Jupyter Notebook 179 11 Updated Jul 8, 2024

Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.

Go 246 31 Updated Feb 17, 2025

A lightweight, memory-protected, message-passing kernel for deeply embedded systems.

Rust 3,113 189 Updated Feb 25, 2025

Repository for the LinkScope Client software.

Python 308 23 Updated Aug 12, 2024

Truly independent web browser

C++ 28,207 1,225 Updated Feb 26, 2025

Icinga Check for EOL

Python 3 Updated Jan 31, 2022

Theseus is a modern OS written from scratch in Rust that explores 𝐢𝐧𝐭𝐫𝐚𝐥𝐢𝐧𝐠𝐮𝐚𝐥 𝐝𝐞𝐬𝐢𝐠𝐧: closing the semantic gap between compiler and hardware by maximally leveraging the power of language safety an…

Rust 2,966 175 Updated Sep 22, 2024

Malicious traffic detection system

Python 6,776 1,118 Updated Feb 26, 2025

SeaweedFS is a fast distributed storage system for blobs, objects, files, and data lake, for billions of files! Blob store has O(1) disk seek, cloud tiering. Filer supports Cloud Drive, cross-DC ac…

Go 23,770 2,350 Updated Feb 26, 2025

Proactive, Open source API security → API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom tests, Sensitive data exposure

Java 1,202 226 Updated Feb 26, 2025

PgQueuer is a Python library leveraging PostgreSQL for efficient job queuing.

Python 1,210 20 Updated Feb 16, 2025

Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifyin…

928 85 Updated Jan 21, 2025

A repo to conduct vulnerability enrichment.

573 51 Updated Feb 26, 2025
Next
Showing results