Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
-
Updated
Jul 7, 2024 - C
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
OSINT Template Engine
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
HardenedBSD implements strong exploit mitigations and security hardening technologies on top of FreeBSD, with a direct focus on the nexus between human rights and information security. HardenedBSD is the first (and only) enterprise operating system to have every part of its public infrastructure accessible by human-rights focused technologies li…
👾 𝘁𝗼𝗼𝗹𝘀 𝗳𝗼𝗿 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗿𝗲𝘀𝗲𝗮𝗿𝗰𝗵𝗲𝗿𝘀: 𝗽𝗲𝗻𝘁𝗲𝘀𝘁𝗶𝗻𝗴, 𝗖𝗧𝗙𝘀 & 𝘄𝗮𝗿𝗴𝗮𝗺𝗲𝘀
Localroot-ALL-CVE~
Leaked hacking tools found in vulnerable SSH servers.
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the keystrokes.
InfoSec Binary Hex Editor with Retro Disassemblers
A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau
KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their devices to determine whether they are vulnerable to key reinstallation attacks, or attack those devices.
A simple backdoor for servers and embedded systems.
An example kernel module rootkit to get reverse shell
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
Created by The cybersecurity community