cybersecurity
Here are 831 public repositories matching this topic...
A collection of Linux Sysadmin Test Questions and Answers. Test your knowledge and skills in different fields with these Q/A.
-
Updated
Mar 8, 2020
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
-
Updated
Mar 9, 2020 - Python
A curated list of tools for incident response
-
Updated
Mar 9, 2020
Describe the solution you'd like
Documentation that lists the different CLI commands that can be issued via cake.
(can work on this myself; putting this as a reminder)
cake
cake CakeResque.CakeResque
Describe alternatives you've considered
Trial and error.
Git All the Payloads! A collection of web attack payloads.
-
Updated
Mar 8, 2020 - Shell
the work_s32, work_s16,… functions do things in unaccelerated code, but should be using the appropriate VOLK functions instead – this might not be a large issue, since audio rates are by definition low, but it reduces code duplication and has potential for speedup, especially on embedded platforms.
Greetings,
Please provide class diagram of opencti project.
How the backend works? Please described the system work flow.
example ..
- worker will retrieve threat feeds from the sources
- worker will store the ingested feed to database (Grakn)
.. etc.
I am thinkering of converting OpenCTI to .NET platform.
One option is to develop the front-end running in asp.net and connects to O
A list of resources in different fields of Computer Science (multiple languages)
-
Updated
Mar 8, 2020
The project works with 8 modules < reference source/Module >
- Creating issue to accelerate/track test frame building of each module
- The test folder has a very basic example to start with.
- Feel free to make a pull request for the test cases
Description of problem:
I have never written SCAP content before, and am looking at how to get started. I would like to write SCAP content to test compliance on Photon OS against DISA SRGs. I have been all over the wiki pages, but I am still not sure how to get started. The main page makes it look super easy for writing OVAL and XCCDF files using YAML, but I am not sure where to build those
Simple CLI forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux
-
Updated
Mar 9, 2020 - Python
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
-
Updated
Mar 8, 2020 - Python
I'm submitting a ... (check one with "x")
- ( X ) bug report
- ( ) feature request
- ( ) support request
Current behavior
"String" Variable always seen in Good Quality when timestamped_get is used, returning value, statusCode and Timestamps. Int/Float variables disp
Awesome Node.js Security resources
-
Updated
Mar 8, 2020
As requested, I am pointing to a comment you solicited regarding some improvements I would suggest for dawnscanner. The improvements are:
- Document all scans that are performed, grouping them by type of scan and detailing what they scan
- Consider not using a centralized scan directory at the top level of the user home dir
- Document the scan results DB and dir structure
For original com
Hi,
I plan to run WALKOFF in a high-availability setup within a cluster.
Unforunately there is no documentation available.
Is this technically possible? Can you give me some hints in the right direction?
Otherwise I think this would be a great feature ;)
-
Updated
Mar 7, 2020
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
-
Updated
Mar 7, 2020 - Python
As a user of the ATT&CK Navigator, I want to be able to remove subtechniques features from the view. This should use the existing "navigator features" functionality in the config file and the "create a customized navigator" feature.
See this medium post for more information about subtechniques.
Hi,
when installing a new instance on @CSIRTMalta , it helped us a lot to create a diagram that denotes all the important folders, users and their rights. We'd like to push it to the Installation.md so that everyone can profit.
(There are multiple typos, like "lb" instead of lib", "intelmqv5" will be "human administrator", "sudders" will be sudoers.)


Currently there's possiblity to make "one-liner scan" of system using curl (https://vuls.io/docs/en/usage-server.html). Issue is, that received JSON can't be displayed nicely with application, because application always want's to get the data from vulnerability DB (even there's everything needed in the JSON returned by vul