Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
-
Updated
Jun 15, 2024 - C
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Open Source Deep Packet Inspection Software Toolkit
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
OSINT Template Engine
Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
Protect your SIP Servers from bad actors at https://sentrypeer.org
👺 A Backdoor For Apache HTTP Server Written in C
My public notes about offensive security
Cybersecurity research results. Simple C/C++ and Python implementations
A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
Localroot-ALL-CVE~
This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
Red Team Operation's Defense Evasion Technique.
A USB-based script for Ethical hacking with multiple attacks
Program examples utilizing the DPDK. The DPDK is a kernel-bypass network library that allows for very fast network packet processing. This is great for (D)DoS mitigation and low-latency packet inspection, manipulation, and forwarding.
A Github repository I created while studying the Software Security course on Coursera. I made the repository public to discuss solutions with like-minded developers.
Created by The cybersecurity community