Updated 6 months ago

graphqler • Rank 6.4 • Science 64%

🔍A cutting edge context aware GraphQL API fuzzing tool!

Updated 6 months ago

https://github.com/critical-infrastructure-systems-lab/dhalsim • Rank 6.9 • Science 54%

Digital Twin for Water Distribution Systems. A work by the SUTD Critical Infrastructure Systems Lab, TU Delft, CISPA, and iTrust

Updated 6 months ago

hawk-eye-scanner • Rank 11.8 • Science 44%

A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.

Updated 6 months ago

laicrypto • Rank 9.8 • Science 44%

LAI is a promising post-quantum cryptosystem based on isogenies of elliptic curves over lemniscate lattices, offering resistance against quantum-capable adversaries.

Updated 6 months ago

virustotal • Rank 8.7 • Science 44%

R client for the Virustotal Public API. Virustotal is a Google service that analyzes files and URLs for viruses etc.

Updated 6 months ago

windows-dll-injector • Rank 4.9 • Science 44%

💉 A Windows dynamic-link library injection tool written in C++20. It can inject a dynamic-link library into a running process by its window title or create a new process with an injection.(使用C++20开发的Windows动态链接库注入工具,可以通过窗口标题注入运行中的进程,或在创建新进程时注入。)

Updated 6 months ago

ghosts • Rank 9.4 • Science 36%

GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise

Updated 6 months ago

https://github.com/alan-turing-institute/causal-cyber-defence • Rank 3.3 • Science 20%

This repository contains glue-code necessary to run dynamic Causal Bayesian optimisation within the Yawning Titan cyber-simulation environment.

Updated 6 months ago

https://github.com/byt3n33dl3/gxc-bloodhuntr • Rank 0.7 • Science 13%

Veins and Blood hunting knife collections for Active Directory Execution process.

Updated 6 months ago

synapse • Science 44%

SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degree thesis in Cybersecurity at Politecnico di Torino, in partnership with SECURITY REPLY S.R.L.

Updated 6 months ago

threatactorprocedures-mitre-attack • Science 44%

A collection of specific commands used by threat actors, detailing their procedural implementations of tactics and techniques from the MITRE ATT&CK framework.

Updated 6 months ago

dataset_tools • Science 44%

A tool set to work with our Stratosphere Laboratory cybersecurity datasets.

Updated 6 months ago

https://github.com/byt3n33dl3/gxc-ghidra • Science 26%

Software for Reverse Engineering (SRE) suite of tools Developed by NSA Research Directorate in support of the Cybersecurity processes.

Updated 6 months ago

https://github.com/aliasrobotics/rvss • Science 10%

Robot Vulnerability Scoring System (RVSS) Python 3 reference implementation.

Updated 6 months ago

https://github.com/awslabs/threat-designer • Science 26%

Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.

Updated 6 months ago

https://github.com/aliasrobotics/rctf • Science 10%

Scenarios of the Robotics CTF (RCTF), a playground to challenge robot security.

Updated 6 months ago

system-modeller • Science 44%

Spyderisk web service and web client

Updated 6 months ago

hexa_payload_decoder • Science 44%

A tool to automatically decode and translate any TCP hexa payload data form any language to english.

Updated 6 months ago

goasm-rat • Science 44%

💻 A Windows console remote administration tool written in Go & Intel x86 Assembly. It supports remote shell and screenshot.(使用Go和Intel x86汇编开发的Windows终端远程管理工具,支持远程Shell和屏幕截图。)

Updated 6 months ago

https://github.com/alfa-group/robust-adv-malware-detection • Science 10%

[IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O’Reilly

Updated 6 months ago

reg_breach • Science 57%

Have I Been Pwned? Yes. Evidence from HIBP and Emails From Voter Registration Files.

Updated 6 months ago

formal-verification-of-the-session-protocol • Science 44%

This repository contains the resources and files related to the formal verification of the Session protocol using the Tamarin prover. The work focuses on verifying the security properties of the Session protocol in the symbolic model, encompassing peer-to-peer message delivery and onion routing.

Updated 6 months ago

stratocyberlab • Science 26%

Stratosphere Cyber Range to learn cybersecurity attacking and defending techniques locally in your computer

Updated 6 months ago

heifip • Science 49%

heiFIP: A tool to convert network traffic into images for ML use cases

Updated 6 months ago

csle-agents • Science 49%

A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, reinforcement learning, optimization, evolutionary methods, and causal inference.

Updated 6 months ago

yao_protocol_simulation • Science 44%

Simple implementation of a distributed 8-bit adder function using Yao's Garbled Circuit protocol for Secure Multi Party Computation (SMPC)

Updated 6 months ago

typesecure • Science 44%

A focused TypeScript cryptography package that provides secure encryption and hashing utilities with strong typing and runtime validation using Zod.

Updated 6 months ago

https://github.com/aliasrobotics/rsf • Science 10%

The Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.

Updated 6 months ago

https://github.com/aielte-research/hacksynth • Science 23%

LLM Agent and Evaluation Framework for Autonomous Penetration Testing

Updated 6 months ago

brski-py • Science 57%

A "Bootstrapping Remote Secure Key Infrastructure" (BRSKI) Demonstrator in Python

Updated 6 months ago

https://github.com/byt3n33dl3/thc-nuclei • Science 23%

🧛🏻 Nuclei is a fast Customizable SSL scanner powered by Offensive Community, built on .NET's DLR based DSL. Zero shot vulnerability discovery.

Updated 6 months ago

https://github.com/copyleftdev/strider • Science 26%

🔒 STRIDER - Advanced Web Security Analysis Platform | AI-Powered Vulnerability Detection & Automated Security Scanning with Go

Updated 6 months ago

https://github.com/csvl/sema • Science 26%

SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.

Updated 6 months ago

security-datasets-for-testing • Science 44%

A set of security datasets for testing of tools and algorithms

Updated 6 months ago

https://github.com/amr-yasser226/machine-learning-for-network-intrusion-detection • Science 26%

A complete pipeline for network intrusion detection comparing label encoding and one‑hot encoding, with SMOTE resampling, feature selection, and ensemble modeling using scikit‑learn and XGBoost, also this was phase one of our University's "CSAI 253- Machine Learning" course.

Updated 6 months ago

https://github.com/czs108/microsoft-malware-classification • Science 10%

🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Windows PE structures, disassembly scripts and machine code.

Updated 6 months ago

cai • Science 54%

Cybersecurity AI (CAI), the framework for AI Security

Updated 6 months ago

iocs • Science 44%

A repository for sharing indicators of compromise (IoCs) we have observed in the last 24 hours.