Showing 30 of 102 projects
A free software toolkit for performing DoS/DDoS attacks and creating encrypted P2P networks.
A fast, multi-protocol credential brute-forcer that parses Nmap, Nessus, and Nexpose output to test credentials across 30+ services.
A powerful, easily deployable network traffic analysis tool suite for PCAP files, Zeek logs, and Suricata alerts.
A Linux Kernel Module (LKM) rootkit for hiding processes, granting root privileges, and making files invisible.
An open-source security automation platform (SOAR) built for security professionals, focusing on collaboration and resource sharing.
An open-source, lightweight TCP/UDP tunneling solution with connection pooling and multi-protocol support for bypassing network restrictions.
A service that provides easy-to-remember reverse shell payloads for Unix-like systems, automatically detecting available software on the target.
An agile cybersecurity incident management platform for tracking, reporting, and responding to security incidents.
An agile cybersecurity incident management platform for tracking, reporting, and responding to security incidents.
An open-source OSINT tool that automates Twitter intelligence analysis by extracting and structuring user data, activity, and geolocation information.
A secure low-code honeypot framework that uses AI to create high-interaction decoy systems for cyber attack detection and analysis.
A curated list of resources for adversarial machine learning, covering attacks, defenses, and research.
A suite of network fingerprinting standards for TLS, TCP, HTTP, SSH, and other protocols to facilitate threat detection and security analysis.
An open-source malware analysis framework that functions as a self-hosted alternative to VirusTotal.
A Python tool that catches potential phishing domains in near real-time by analyzing suspicious TLS certificate issuances via CertStream.
A curated collection of academic papers on data mining and machine learning techniques for fraud detection across various domains.
A repository of publicly-available reports and blogs on APT (Advanced Persistent Threat) campaigns, activity, and software, organized by year.
A terminal-based tool to interactively scan raw disk partitions and recover deleted or overwritten files by searching for byte patterns.
A curated list of threat modeling resources including books, courses, videos, tools, tutorials, and examples for learning and practicing threat modeling.
A multi-platform client-server tool for distributing Hashcat password cracking tasks across multiple computers.
A medium interaction SSH honeypot that logs brute force attacks and attacker shell interactions.
A collection of ready-to-use KQL queries for threat hunting, detection, and analytics in Microsoft Defender for Endpoint and Azure Sentinel.
A modern hash identification tool that names MD5, SHA256, and 300+ other hash types with popularity ratings and summaries.
An open-source repository of security detections, analytic stories, and response playbooks mapped to MITRE ATT&CK for Splunk Enterprise Security.
A collection of small, chainable command-line utilities for advanced password cracking operations.
A curated list of awesome resources, tools, and literature on executable packing, unpacking, and detection for malware analysis and cybersecurity.
A curated list of awesome resources for executable packing, unpacking, and detection, covering packers, tools, and literature.
A curated list of awesome resources (papers, tools, packers) related to executable packing, unpacking, and detection for malware analysis and cybersecurity.
A binary analysis and management framework for organizing malware samples, exploits, and research scripts.
Statistical password cracking rules for Hashcat based on industry patterns and frequency analysis.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.