Showing 36 of 102 projects
A curated collection of interesting, funny, and concerning search queries for Shodan.io to find exposed devices and services.
An open-source adversary emulation platform that simulates malware attacks to test and improve network security defenses.
An automated cyber security platform for adversary emulation, red teaming, and incident response built on the MITRE ATT&CK framework.
A customizable, easy-to-use Capture The Flag framework for running cybersecurity competitions.
An open-source platform for hosting Jeopardy and King of the Hill style Capture the Flag competitions.
A curated collection of security hardening guides, best practices, checklists, benchmarks, and tools for various systems and services.
An open-source platform for collecting, storing, sharing, and acting upon cybersecurity threat intelligence and indicators.
An easy-to-use, powerful, and reliable system to process and distribute data across cybersecurity, observability, and AI pipelines.
A comprehensive, free information security reference covering techniques, tools, tactics, and resources for learning and professional development.
A Python-based hacking tool for remotely exploiting Android devices via ADB and Metasploit to gain Meterpreter sessions.
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation.
A curated list of awesome information security courses, training resources, and hands-on labs for cybersecurity professionals and students.
A curated list of bug bounty programs, write-ups, and resources for security researchers and ethical hackers.
A Python framework to automate the installation and updating of penetration testing tools on Debian/Ubuntu/ArchLinux systems.
An extensible Python framework for network forensic analysis through plugin-based dissection of packet captures.
A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
A curated list of awesome free (mostly open source) forensic analysis tools and resources for digital investigations.
A curated list of awesome free forensic analysis tools, resources, and learning materials for digital investigators.
A community-driven open-source project that structures threat hunting workflows using MITRE ATT&CK, Jupyter notebooks, and AI-augmented planning.
A browsable archive of decrypted NSA exploit tools and implants leaked by the Shadow Brokers in 2017.
A curated list of awesome YARA rules, tools, and resources for malware researchers and security professionals.
A memory forensics framework for extracting digital artifacts from volatile memory (RAM) samples across Windows, Linux, and macOS.
A self-hosted network reconnaissance framework for building alternatives to Shodan, ZoomEye, Censys, and GreyNoise.
A static analysis tool that automatically extracts and deobfuscates strings from malware binaries.
An open-source threat hunting platform with advanced analytics capabilities built on ELK stack, Apache Spark, and Jupyter notebooks.
A testing tool that detects virtual machines and malware analysis environments using techniques observed in real malware.
A commercial remote browser isolation (RBI) platform that streams a full modern browser to any client with low latency and 60 FPS.
A 'Vulnerable by Design' cloud deployment tool for creating and completing capture-the-flag style security scenarios on AWS and Azure.
A curated collection of proof-of-concept exploits for Common Vulnerabilities and Exposures (CVEs).
A comprehensive guide with diagrams and best practices for implementing corporate network segmentation across four security maturity levels.
A security tool that visualizes and analyzes Windows Active Directory event logs to investigate malicious logon activity.
An advanced malware sandbox for automated configuration and payload extraction with dynamic unpacking and anti-evasion capabilities.
A curated list of free, hands-on educational resources for learning cybersecurity through practical exercises and CTF challenges.
A collection of proof-of-concept (PoC) and exploit (Exp) scripts for various security vulnerabilities.
Python wrapper for tshark that enables packet parsing using Wireshark's dissectors for both live capture and file analysis.
A centralized management and data collection server for deploying and monitoring multiple honeypot sensors.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.