515 skills found · Page 1 of 18
infosecn1nja / Red Teaming ToolkitThis repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Security-Onion-Solutions / SecurityonionSecurity Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such as osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
mukul975 / Anthropic Cybersecurity Skills753+ structured cybersecurity skills for AI agents · MITRE ATT&CK mapped · agentskills.io open standard · Works with Claude Code, GitHub Copilot, OpenAI Codex CLI, Cursor, Gemini CLI & 20+ platforms · Penetration testing, DFIR, threat intel, cloud security & more · Apache 2.0
Security-Onion-Solutions / Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
microsoft / MsticpyMicrosoft Threat Intelligence Security Tools
hysnsec / Awesome Threat ModellingA curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
matanolabs / MatanoOpen source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
openappsec / Openappsecopen-appsec is a machine learning security engine that preemptively and automatically prevents threats against Web Application & APIs. This repo include the main code and logic.
pushsecurity / Saas AttacksOffensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown
nuvious / Pam DuressA Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clear sensitive data, notify IT/Security staff, close off sensitive network connections, etc if a user is coerced into giving a threat actor a password.
TalEliyahu / Awesome Security NewslettersPeriodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attacks
tirrenotechnologies / Tirrenotirreno is an open-source security framework. Event tracking, threat detection, and risk scoring for any application.
step-security / Harden RunnerHarden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. It monitors network egress, file integrity, and process activity on those runners, detecting threats in real-time.
mikeroyal / Open Source Security GuideOpen Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
cisco-ai-defense / MCP ScannerScan MCP servers for potential threats & security findings.
dev-lu / Osint ToolkitOpen source platform for cyber security analysts with many features for threat intelligence and detection engineering.
dragokas / HijackthisA free utility that finds malware, adware and other security threats
rennf93 / Fastapi GuardA security library for FastAPI that provides middleware to control IPs, log requests, and detect penetration attempts. It integrates seamlessly with FastAPI to offer robust protection against various security threats.
xtiankisutsa / MARA FrameworkMARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile application reverse engineering and analysis tools to assist in testing mobile applications against the OWASP mobile security threats.
CuriousLearnerDev / TrafficEyeThis tool is designed to help penetration testers and network administrators identify potential security threats, especially those targeting web applications such as SQL injection, XSS, and WebShells. Its modular desig 该工具适用于 HW 蓝队对网络流量的深入分析,帮助安全研究人员、渗透测试人员及网络管理员等专业人士识别潜在的安全威胁,尤其是针对 Web 应用的攻击(如 SQL 注入、XSS、WebShell 等)。其模块化设计使用户能够根据实际需求自由选择并定制各类功能模块