The SpecterOps project management and reporting engine
-
Updated
Jun 6, 2024 - Python
The SpecterOps project management and reporting engine
OWASP Honeypot, Automated Deception Framework.
A Blazing fast Security Auditing tool for Kubernetes
Common Errors,self-written scripts related to information security,CTF challenges,steganography,forensics,web,crypto or OSINT and more
Common (and Advanced) Information Security Questions. Questions you should know the answer to for your information security career.
A tools for mathematical caculation such as greatest common factor, primitive roots, primality test .etc
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
All things Cybersecurity!
lightweight http redirector written in nim
List of various ethical hacking tools
TOR VPN - USE TOR LIKE VPN
THAMARA - Threat Hunting with AMSI and YARA
Information Security and Privacy Assignment at NYU
Shade_hunt is an open-source Node.js brute force tool designed to test the security and authentication of systems. With a minimalistic and highly customizable interface, it allows for testing different types of authentication, from simple passwords to API keys and access tokens.
Tools & Cases
Mandatory Access Control (MAC) is a stringent security protocol that dictates how resources are allocated and who has access rights within a computing environment.
Info Sec home lab blog
Offensive Security Research, Corporate Espionage Investigation
A secure and user-friendly password encryption and decryption tool, leveraging advanced cryptography for reliable password management.
Add a description, image, and links to the informationsecurity topic page so that developers can more easily learn about it.
To associate your repository with the informationsecurity topic, visit your repo's landing page and select "manage topics."