-
Le blog de Nicolargo
- Valbonne, France
- https://sourcerer.io/nicolargo
- @nicolargo
Cyber
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
A little tool to play with Windows security
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
A python module for working with ATT&CK
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Kubernetes Security - Best Practice Guide
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Example recipes for Kubernetes Network Policies that you can just copy paste
Hunt down social media accounts by username across social networks
Code signing and transparency for containers and binaries
CLI tool and library for generating a Software Bill of Materials from container images and filesystems
Build Container Images In Kubernetes
🤖 Dependabot's core logic for creating update PRs.
A simple multi-threaded distributed SSH brute-forcing tool written in Python
Boundary enables identity-based access management for dynamic infrastructure.
Lab environment to accompany Boundary Vault Integration Quickstart Learn tutorial.
A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
A simple, low-interaction NTP honeypot server in Python for easy network traffic monitoring
Globstar is a fast, feature-rich, and open-source static analysis toolkit for writing and running code checkers. Based on tree-sitter.
Zero shot vulnerability discovery using LLMs
A simple zero-config tool to make locally trusted development certificates with any names you'd like.
A simple python based Key-Logger project in Cyber Security
A list of useful payloads and bypass for Web Application Security and Pentest/CTF






