-
Updated
Aug 20, 2020 - Python
#
cybersecurity
Here are 355 public repositories matching this topic...
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
training
exploit
hackers
hacking
cybersecurity
penetration-testing
exploits
vulnerability
awesome-list
video-course
hacker
vulnerability-management
vulnerability-identification
vulnerability-scanners
vulnerability-assessment
ethical-hacking
awesome-lists
exploit-development
ethicalhacking
hacking-series
Security automation content in SCAP, OSCAL, Bash, Ansible, and other formats
security
ansible
cybersecurity
pci-dss
application-security
compliance
scap
hardening
security-hardening
xccdf
oval
cpe
information-security
cce
usgcb
ospp
stig
security-automation
security-tools
security-profile
-
Updated
Aug 20, 2020 - Python
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
security
password
cybersecurity
penetration-testing
pentest-tool
security-testing
default-password
default-credentials
-
Updated
Dec 23, 2018 - Python
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
cybersecurity
network-programming
ethical-hacking
network-security
python-hacking
hacking-tools
blackhat-python
blackhat-python-source-code
-
Updated
Jun 13, 2020 - Python
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
python
security
workflow
devops
automation
framework
administration
integration
analytics
orchestration-framework
sysadmin
orchestration
cybersecurity
automation-framework
orchestrator
walkoff
walkoff-apps
walkoff-workflows
-
Updated
Aug 7, 2020 - Python
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
python
dns
security
workflow
automation
analysis
phishing
hash
cybersecurity
soc
security-automation
analysts
urlscan
reputation-check
proofpoint-decoder
soc-analysts
-
Updated
Jun 7, 2020 - Python
1
mlmarkovic
commented
Jul 15, 2020
Most .py files use #!/usr/bin/python3 as shebang, but few others use #!/usr/bin/env python3.
Files which use #!/usr/bin/env python3:
./contrib/eventdb/common.py
./intelmq/bin/intelmq_generate_misp_objects_templates.py
./intelmq/tests/bots/parsers/github_feed/test_parser.py
These files should use #!/usr/bin/python3 for the sake of consistency.
NFStream: a Flexible Network Data Analysis Framework.
python
data-science
machine-learning
data-mining
netflow
pcap
packet-analyser
traffic-analysis
artificial-intelligence
cybersecurity
network-monitoring
data-analysis
dataset-generation
network-analysis
packet-capture
ndpi
network-security
deep-packet-inspection
traffic-classification
-
Updated
Aug 20, 2020 - Python
hacking
cybersecurity
penetration-testing
francais
pentesting
france
cyber-security
pentest-environment
hacking-tool
pentest-scripts
pentesters
pentest-tool
redteaming
redteam
hacking-tools
pentesting-tools
blueteaming
blackarch-packages
pentesting-python
sofianehamlaoui
-
Updated
Aug 20, 2020 - Python
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
cybersecurity
network-programming
ethical-hacking
network-security
violent-python
python-hacking
hacking-tools
violent-python-source-code
-
Updated
Jun 20, 2020 - Python
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
python
hacking
python3
cybersecurity
keylogger
offensive-security
cyber-security
hacking-tool
keylog
keylogger-analysis
python-hacking
python-tools
hacking-tools
hacking-code
keylogging
keylogger-screenshot
hackingtools
keylogs
offensive-scripts
keyloger
-
Updated
Aug 18, 2020 - Python
Cyber Analytics Repository
-
Updated
Aug 20, 2020 - Python
ctn
commented
Aug 20, 2020
Add ideas/suggestions here and we'll discuss/greenlight them. Thanks.
An analytical framework for network traffic and behavioral analytics
-
Updated
Apr 15, 2020 - Python
An advanced tool for email reconnaissance
-
Updated
Mar 26, 2020 - Python
A Python RESTful API framework for online malware analysis and threat intelligence services.
-
Updated
Mar 23, 2020 - Python
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
docker
kubernetes
aws
google
cloud
amazon
gcp
rhino
cybersecurity
gke
k8s
pentesting
gce
pentest
ecr
eks
ccat
rhinosecuritylabs
-
Updated
Nov 21, 2019 - Python
Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
-
Updated
Jun 20, 2020 - Python
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15
machine-learning
deep-learning
cybersecurity
intrusion-detection
network-security
network-intrusion-detection
kdd99
nsl-kdd
unsw-nb15
-
Updated
May 8, 2019 - Python
Tool to enumerate information from NTLM authentication enabled web endpoints 🔎
security
osint
tools
arch
hacking
cybersecurity
enumeration
ntlm
recon
reconnaissance
redteam
enumerates
hacking-tools
ntlmssp
ntlmrecon
dns-domain
-
Updated
Aug 20, 2020 - Python
Automated Tactics Techniques & Procedures
-
Updated
Nov 12, 2019 - Python
A modular Python application to collect intelligence for malicious hosts.
-
Updated
Mar 2, 2020 - Python
Don't Just Search OSINT. Sweep It.
python
osint
splunk
cybersecurity
certificate-transparency
ransomware
threat-hunting
malware-analysis
scanners
cybercrime
threat-analysis
pivoting
threat-intelligence
urlscan-io
threatcrowd
urlhaus
-
Updated
Jun 24, 2019 - Python
WebMap-Nmap Web Dashboard and Reporting
-
Updated
Mar 16, 2020 - Python
MITRE ATT&CK Website
-
Updated
Aug 19, 2020 - Python
WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.
intelligence
wifi
cybersecurity
recon
sigint
wifi-security
cyberpunk
reconaissance
intelligence-gathering
wifi-client-detection
electronic-warfare
cyberweapon
cybercyber
-
Updated
Aug 14, 2020 - Python
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
security
powershell
python3
cybersecurity
post-exploitation
offensive-security
security-tools
c2
command-and-control
redteam
implant
purpleteam
readteaming
-
Updated
Jun 30, 2020 - Python
The platform used to run picoCTF. A great framework to host any CTF.
-
Updated
Jul 20, 2020 - Python
Scripts and a (future) library to improve users' interactions with the ATT&CK content
-
Updated
Aug 20, 2020 - Python
Improve this page
Add a description, image, and links to the cybersecurity topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cybersecurity topic, visit your repo's landing page and select "manage topics."
The project works with 8 modules < reference source/Module >