IOCs that appear in this repository are meant to be long-lasting indicators of compromise.
-
Updated
Jun 1, 2024
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
IOCs that appear in this repository are meant to be long-lasting indicators of compromise.
An auto-updating list of shodan dorks with info on the amount of results they return!
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
API Penetration Testing Notes
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
資安解壓縮的家 Website of Infosec Decompress
Ficheros con IPs maliciosas para cargar directamente en tus sistemas defensivos
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
An intelligent React component to obfuscate any contact link!
Gather and update all available and newest CVEs with their PoC.
HardenedBSD implements strong exploit mitigations and security hardening technologies on top of FreeBSD, with a direct focus on the nexus between human rights and information security. HardenedBSD is the first (and only) enterprise operating system to have every part of its public infrastructure accessible by human-rights focused technologies li…
🕵️ OSINT Tool (github tracker)
This Python application is an OSINT (Open Source Intelligence) tool called "Ominis OSINT - Web Hunter." It performs online information gathering by querying Google for search results related to a user-inputted query. The tool extracts relevant information such as titles, URLs, and potential mentions of the query in the results.
Threat Hunting queries for various attacks
Odynova Digital Tiger was created to speed up OSINT tasks and make OSINT more efficient and is currently being developed
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Created by The cybersecurity community