A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
-
Updated
Jun 12, 2024 - JavaScript
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
My Privacy DNS #Matrix lists for blacklisting
Jokes Application A web-based application for creating, storing, and searching jokes, built with HTML, PHP, MySQL, and jQuery. Features user authentication and secure data handling. Features: Create and store jokes in a MySQL database Search jokes by keywords User registration and login with secure password hashing Deployed on AWS EC2
Security automation content in SCAP, Bash, Ansible, and other formats
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
one-stop resource for all things offensive security.
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
Call for papers / accepted papers in top computer security and deep learning fields.
This repository contains all the assignments, books and other stuffs of Master of Science in Information Technology at Arizona State University.
Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
Kali Linux as a docker container.
Run TOR conveniently from a docker container.
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
hammergarden releases, wiki and roadmap.
Ansible role to apply a security baseline. Systemd edition.
👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetration testing and offensive cybersecurity.
Documentation for the Compliant Kubernetes project
AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project
AIL framework - Analysis Information Leak framework
OSINT cheat sheet, list OSINT tools, dataset, article, book and OSINT tips
Created by The cybersecurity community