Starred Repositories
Browse starred repositories
Sort: Recently starred
-
A tool to create, transform and attest VEX metadata
-
Terraform provider for Tines
-
Automated build and mirror of eBPF kernel probes for use as a driver with the Falco runtime security agent (https://falco.org/)
-
A curated list of awesome Elastic resources
2 StarredSep 19, 2022 -
Date coordination for social events
-
Smart SSH, HTTPS and MySQL bastion that requires no additional client-side software
-
A tool for batch loading data files (json, parquet, csv, tsv) into ElasticSearch
-
Main Sigma Rule Repository
-
ElastAlert 2 is a continuation of the original yelp/elastalert project. Pull requests are appreciated!
-
Create secure and private web apps using only static JavaScript, HTML, and CSS.
-
The fastest knowledge base for growing teams. Beautiful, realtime collaborative, feature packed, and markdown compatible.
-
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
-
In-depth attack surface mapping and asset discovery
-
A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
-
GoAccess is a real-time web log analyzer and interactive viewer that runs in a terminal in *nix systems or through your browser.
-
The page content and configuration repo for https://dohproxy.com
-
Distributed crawler powered by Headless Chrome
-
Pathbrute
-
A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates
-
A matlab toolkit for interpolating scattered data in interesting ways.
-
Research on GraphQL from an AppSec point of view.
-
CVE-2019-5736 POCs
-
The best CLI client for Slack, because everything is terrible!
-
Declarative penetration testing orchestration framework
-
Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities
-
Test utility for cve-2018-1002105
-
Node.js API for Chrome
-
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
-
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
-
Kubernetes Security - Best Practice Guide