Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
-
Updated
May 16, 2024 - C
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Set of tools to audit SIP based VoIP Systems
A curated list of cryptography resources and links. With repository stars⭐ and forks🍴
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Container terminal application for intercepting packets within pod/namespace using Scapy and ttyd terminal
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Audit your Node version for known CVEs and patches
Audit your PHP version for known CVEs and patches
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
🔥 A fully open source audit logs service and embeddable UI easily deployed to your own Kubernetes cluster. Brought to you by replicated.com and boxyhq.com 🚀
Create, share, and run runbooks from your terminal.
⚡️ Docker official image for Wallarm Node. API security platform agent.
Vulnerability scanner written in Go which uses the data provided by https://osv.dev
The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.
This Python script provides a sophisticated botnet detection system that leverages signature-based detection, machine learning algorithms, behavioral analysis, and traffic profiling to identify potential botnet activity in real-time. It also includes advanced alerting capabilities and integration with IP reputation services and SIEM for DETECTION!
Kubernetes Attack Graph