Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
-
Updated
Sep 13, 2024 - C
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Open Source Deep Packet Inspection Software Toolkit
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
OSINT Template Engine
Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
Protect your SIP Servers from bad actors at https://sentrypeer.org
Cybersecurity research results. Simple C/C++ and Python implementations
👺 A Simple Backdoor For Apache HTTP Server
My public notes about offensive security
A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
Localroot-ALL-CVE~
This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
Red Team Operation's Defense Evasion Technique.
A USB-based script for Ethical hacking with multiple attacks
Program examples utilizing the DPDK. The DPDK is a kernel-bypass network library that allows for very fast network packet processing. This is great for (D)DoS mitigation and low-latency packet inspection, manipulation, and forwarding.
A Github repository I created while studying the Software Security course on Coursera. I made the repository public to discuss solutions with like-minded developers.
IAV quantumSAR - "Quantum-proof your data with our state of the art cryptographic implementation"
Created by The cybersecurity community