Starred repositories
A full insecure kubernetes application for testing security tools
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
Collection of Cyber Threat Intelligence sources from the deep and dark web
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar…
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
Timeline component with gallery view and scrolling time plots.
OWASP Foundation Web Respository
Source code for Twitter's Recommendation Algorithm
Source code for Twitter's Recommendation Algorithm
A curated list of community detection research papers with implementations.
An AWS CloudFront Lambda@Edge function to authenticate requests using Google Apps, Microsoft, Auth0, OKTA, and GitHub login
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
Arduino library for Heltec ESP32 (or ESP32+LoRa) based boards
Arduino library for Heltec ESP8266 based boards
JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.
Open Security Controls Assessment Language (OSCAL)
GyoiThon is a growing penetration test tool using Machine Learning.
Terraform module which calculates price of AWS infrastructure (from Terraform state and plan) 🇺🇦
Red Team K8S Adversary Emulation Based on kubectl
Boundary enables identity-based access management for dynamic infrastructure.