-
Honey Badger Security
Lists (2)
Sort Name ascending (A-Z)
Stars
Here we discuss how one can investigate crypto hacks and security incidents, and collect all the possible tools and manuals! PRs are welcome! If any tool is missing - please open PR!
Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!
Xbox controller support for StarCraft 1, StarCraft II, WarCraft II: Remastered and WarCraft III.
Docker configuration to quickly setup your own Canarytokens.
Canarytokens helps track activity and actions on your network.
A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspicious activities.
Bazzite is a custom Fedora Atomic image built with cloud native technology that brings the best of Linux gaming to all of your devices - including your favorite handheld.
Generate massive amounts of fake data in the browser and node.js
This repository provides tutorials and implementations for various Generative AI Agent techniques, from basic to advanced. It serves as a comprehensive guide for building intelligent, interactive A…
A curated list of resources dedicated to open source GitHub repositories related to ChatGPT and OpenAI API
Public release of Telepathy, an OSINT toolkit for investigating Telegram chats.
Collection of Cyber Threat Intelligence sources from the deep and dark web
User-friendly AI Interface (Supports Ollama, OpenAI API, ...)
Get up and running with Llama 3.3, DeepSeek-R1, Phi-4, Gemma 2, and other large language models.
Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools. A repository where naiveté in infosec is met with humor.
Search for sensitive data in Postman public library.
🐬 A collection of awesome resources for the Flipper Zero device.
Flipper Zero firmware source code
Made to be used with Flipper just drag the folder into NFC
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Find, verify, and analyze leaked credentials
Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailor the pre-packaged solution.
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.