The "Awesome Cybersecurity Blue Team" project is a curated collection of resources dedicated to the practices and tools used by blue teams in cybersecurity. Blue teams are responsible for defending an organization’s information systems against cyber threats, identifying vulnerabilities, and implementing security measures. This list includes various categories such as incident response tools, threat intelligence platforms, security frameworks, training materials, and community resources. It serves as a valuable asset for cybersecurity professionals, from beginners to experienced practitioners, looking to enhance their defensive strategies and skills. Users can explore this collection to strengthen their understanding of cybersecurity defense mechanisms and improve their organization's security posture.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
The "Awesome Hacking" project is a curated resource list designed for those interested in the field of hacking, which involves exploring and exploiting vulnerabilities in computer systems and networks. This list encompasses a wide range of categories, including penetration testing tools, ethical hacking tutorials, security research papers, and community forums. It serves as a valuable resource for beginners looking to learn the basics of cybersecurity, as well as experienced professionals seeking advanced techniques and tools. Whether you are aiming to enhance your skills or stay updated on the latest security trends, this collection offers a wealth of information to support your hacking journey.
The "Awesome Security" project is a curated collection of resources focused on enhancing security practices in the digital realm. This list encompasses a wide range of categories including security tools, libraries, frameworks, tutorials, and best practices for various platforms and technologies. It is designed to benefit security professionals, developers, and system administrators alike, providing valuable insights and tools to safeguard applications and data. Whether you are a beginner looking to understand security fundamentals or an experienced practitioner seeking advanced techniques, this project offers a wealth of information to help you improve your security posture and protect your digital assets.
The "Awesome Malware Analysis" project is a curated resource list designed to assist security professionals and researchers in the field of malware analysis. Malware analysis involves examining malicious software to understand its behavior, functionality, and impact. This list includes tools for static and dynamic analysis, reverse engineering resources, malware databases, and educational materials such as tutorials and courses. It is valuable for both beginners looking to learn the basics and experienced analysts seeking advanced techniques and tools. Users can find a wealth of resources to enhance their skills and improve their malware analysis capabilities.
The "Awesome Web Security" project is a curated collection of resources focused on the security of web applications and services. Web security encompasses practices and technologies designed to protect websites and online services from cyber threats, vulnerabilities, and attacks. This list includes tools for penetration testing, secure coding practices, frameworks, libraries, and educational materials such as articles and tutorials. It is valuable for developers, security professionals, and researchers who seek to enhance their understanding of web security and implement robust security measures. Users can find essential tools and knowledge to safeguard their web applications effectively and stay ahead of potential threats.
An extensible Python framework for network forensic analysis through plugin-based dissection of packet captures.
A collaborative collection of data and code quirks to improve password manager compatibility with websites.
A tool for quickly evaluating IAM permissions and identifying security risks in AWS accounts through graph-based analysis.
An open-source cloud security platform that automates security and compliance assessments across AWS, Azure, GCP, and other cloud providers.
An open-source multi-cloud security auditing tool that assesses cloud environment security posture via provider APIs.
An application kernel for containers that provides strong isolation by implementing a Linux-like interface in memory-safe Go.
A simple wrapper for GPG to encrypt secrets in version control systems like Git, Mercurial, and Subversion.
Static vulnerability analysis for container images (OCI/Docker) via an API that indexes and matches against known security flaws.
A comprehensive security scanner that finds vulnerabilities, misconfigurations, secrets, and SBOMs in containers, Kubernetes, code, and clouds.
A Helm plugin that manages secrets using Git workflows and integrates with cloud secret managers.