🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
-
Updated
Oct 31, 2023 - Python
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
Open Cyber Threat Intelligence Platform
Network Analysis Tool
Find interesting Amazon S3 Buckets by watching certificate transparency logs.
Free hands-on digital forensics labs for students and faculty
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Enhance the security and privacy of your Windows 10 and Windows 11 deployments with our fully optimized, hardened, and debloated script. Adhere to industry best practices and Department of Defense STIG/SRG requirements for optimal performance and security.
Stop half-done APIs! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by auditing your API specifications, validating them and running API security tests.
Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
🔑 Hash type identifier (CLI & lib)
MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs
Shellcode injection technique. Given as C++ header, standalone Rust program or library.
A OSINT tool which helps you to quickly find information effectively. All you need is to input and it will take take care of rest.
GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise
A heavily armed customizable phishing tool for educational purpose only
Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
Venom is a library that meant to perform evasive communication using stolen browser socket
Add a description, image, and links to the cyber topic page so that developers can more easily learn about it.
To associate your repository with the cyber topic, visit your repo's landing page and select "manage topics."