Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
-
Updated
Aug 7, 2025 - C
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Open Source Deep Packet Inspection Software Toolkit
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
OSINT Template Engine
Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
Cybersecurity research results. Simple C/C++ and Python implementations
Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for security professionals and enthusiasts.
Protect your SIP Servers from bad actors at https://sentrypeer.org
My public notes about offensive security
👺 A Simple Backdoor For Apache HTTP Server
This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
Localroot-ALL-CVE~
A cross platform SOCKS5 MITM proxy based network traffic interception tool that enables TLS/SSL inspection, analysis, and manipulation at the network level.
Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion
ATT&CK Evaluations Library
Created by The cybersecurity community