Lists (2)
Sort Name ascending (A-Z)
Stars
Firewall for AI agents. DLP scanning, SSRF protection, bidirectional MCP scanning, tool poisoning detection, and prompt injection blocking.
Algorithm powering the For You feed on X
Shannon Lite is an autonomous, white-box AI pentester for web applications and APIs. It analyzes your source code, identifies attack vectors, and executes real exploits to prove vulnerabilities bef…
A curated list of annual cyber security reports
Wireshark-like forensic analysis for Model Context Protocol communications Capture, inspect, and investigate all HTTP requests and responses between your IDE and MCP servers
Agentic AI Infrastructure for magnifying HUMAN capabilities.
Advanced Living Off the Land (LotL) tactics, tools, and abuse techniques for red teams, defenders, and cyber researchers. Stealth over payload.
Caido plugin which sets the color for all similar requests
Ghidra is a software reverse engineering (SRE) framework
all of the workflows of n8n i could find (also from the site itself)
A comprehensive guide for SOC analysts on using the ELK Stack (Elasticsearch, Logstash, Kibana) for log analysis and incident response. This repository includes tips, tricks, and best practices for…
This repository is dedicated to documenting Splunk knowledge, tips, tricks, and best practices. It covers various aspects of Splunk, including search optimization, dashboard creation, alert setup, …
A MCP server for using Semgrep to scan code for security vulnerabilities.
Automatic and Custom Destinations jump list parser with Windows 10 support
DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
an awesome list of honeypot resources
Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.
Library and tools to access the Windows XML Event Log (EVTX) format
PowerSploit - A PowerShell Post-Exploitation Framework
A little tool to play with Windows security
A repository of sysmon configuration modules
Sysmon configuration file template with default high-quality event tracing
Sysmon configuration file template with default high-quality event tracing
A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-Team defense under an active threat.