https://github.com/critical-infrastructure-systems-lab/dhalsim
Digital Twin for Water Distribution Systems. A work by the SUTD Critical Infrastructure Systems Lab, TU Delft, CISPA, and iTrust
hawk-eye-scanner
A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
laicrypto
LAI is a promising post-quantum cryptosystem based on isogenies of elliptic curves over lemniscate lattices, offering resistance against quantum-capable adversaries.
virustotal
R client for the Virustotal Public API. Virustotal is a Google service that analyzes files and URLs for viruses etc.
windows-dll-injector
💉 A Windows dynamic-link library injection tool written in C++20. It can inject a dynamic-link library into a running process by its window title or create a new process with an injection.(使用C++20开发的Windows动态链接库注入工具,可以通过窗口标题注入运行中的进程,或在创建新进程时注入。)
ghosts
GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise
https://github.com/alan-turing-institute/causal-cyber-defence
This repository contains glue-code necessary to run dynamic Causal Bayesian optimisation within the Yawning Titan cyber-simulation environment.
https://github.com/alan-turing-institute/cage-challenge
Team Mindrake's CAGE Challenge competition index page
https://github.com/byt3n33dl3/gxc-bloodhuntr
Veins and Blood hunting knife collections for Active Directory Execution process.
preferred-network-list-sniffer
A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.
synapse
SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degree thesis in Cybersecurity at Politecnico di Torino, in partnership with SECURITY REPLY S.R.L.
exploring-cybersecurity-data-science
Exploring Cybersecurity Data Science: Dimensionality Reduction and Cluster Analysis
threatactorprocedures-mitre-attack
A collection of specific commands used by threat actors, detailing their procedural implementations of tactics and techniques from the MITRE ATT&CK framework.
dataset_tools
A tool set to work with our Stratosphere Laboratory cybersecurity datasets.
https://github.com/aau-network-security/haaukins
A Highly Accessible and Automated Virtualization Platform for Security Education
https://github.com/amazon-science/cyber-zero
Cyber-Zero: Training Cybersecurity Agents Without Runtime
https://github.com/byt3n33dl3/gxc-ghidra
Software for Reverse Engineering (SRE) suite of tools Developed by NSA Research Directorate in support of the Cybersecurity processes.
https://github.com/aliasrobotics/rvss
Robot Vulnerability Scoring System (RVSS) Python 3 reference implementation.
https://github.com/awslabs/threat-designer
Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.
https://github.com/aliasrobotics/rctf
Scenarios of the Robotics CTF (RCTF), a playground to challenge robot security.
hexa_payload_decoder
A tool to automatically decode and translate any TCP hexa payload data form any language to english.
goasm-rat
💻 A Windows console remote administration tool written in Go & Intel x86 Assembly. It supports remote shell and screenshot.(使用Go和Intel x86汇编开发的Windows终端远程管理工具,支持远程Shell和屏幕截图。)
https://github.com/aau-network-security/haaukins-store
New haaukins component responsible to store data into the database
https://github.com/alfa-group/robust-adv-malware-detection
[IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O’Reilly
https://github.com/aliasrobotics/rvd
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
https://github.com/aryanvbw/arch-linux-for-android
Take control of your Android system with Arch Adventures, bringing the flexibility and customization of Arch Linux to your mobile device! 🚀
reg_breach
Have I Been Pwned? Yes. Evidence from HIBP and Emails From Voter Registration Files.
formal-verification-of-the-session-protocol
This repository contains the resources and files related to the formal verification of the Session protocol using the Tamarin prover. The work focuses on verifying the security properties of the Session protocol in the symbolic model, encompassing peer-to-peer message delivery and onion routing.
stratocyberlab
Stratosphere Cyber Range to learn cybersecurity attacking and defending techniques locally in your computer
csle-agents
A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, reinforcement learning, optimization, evolutionary methods, and causal inference.
yao_protocol_simulation
Simple implementation of a distributed 8-bit adder function using Yao's Garbled Circuit protocol for Secure Multi Party Computation (SMPC)
typesecure
A focused TypeScript cryptography package that provides secure encryption and hashing utilities with strong typing and runtime validation using Zod.
https://github.com/aliasrobotics/rsf
The Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
yafra
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
https://github.com/aielte-research/hacksynth
LLM Agent and Evaluation Framework for Autonomous Penetration Testing
brski-py
A "Bootstrapping Remote Secure Key Infrastructure" (BRSKI) Demonstrator in Python
https://github.com/byt3n33dl3/thc-nuclei
🧛🏻 Nuclei is a fast Customizable SSL scanner powered by Offensive Community, built on .NET's DLR based DSL. Zero shot vulnerability discovery.
https://github.com/copyleftdev/strider
🔒 STRIDER - Advanced Web Security Analysis Platform | AI-Powered Vulnerability Detection & Automated Security Scanning with Go
https://github.com/csvl/sema
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
security-datasets-for-testing
A set of security datasets for testing of tools and algorithms
https://github.com/amr-yasser226/machine-learning-for-network-intrusion-detection
A complete pipeline for network intrusion detection comparing label encoding and one‑hot encoding, with SMOTE resampling, feature selection, and ensemble modeling using scikit‑learn and XGBoost, also this was phase one of our University's "CSAI 253- Machine Learning" course.
https://github.com/chronospk/chronospk.github.io
My cybersecurity website/blog.
misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
discord-osint-assistant
A powerful Discord bot for Open Source Intelligence (OSINT) gathering and analysis
https://github.com/czs108/microsoft-malware-classification
🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Windows PE structures, disassembly scripts and machine code.
iocs
A repository for sharing indicators of compromise (IoCs) we have observed in the last 24 hours.
https://github.com/aleksamcode/wifi-password-stealer
Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).