Giter Club home page Giter Club logo

akshay-sh30's Projects

petereport icon petereport

PeTeReport is an open-source application vulnerability reporting tool.

pidense icon pidense

🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)

plane-alert-db icon plane-alert-db

A list of interesting aircraft - Governments, Dictators, Military, Historic and just plain odd.

planesailing icon planesailing

Plane✈/Sailing⛵ - Completely unnecessary military situational awareness display for your home

portswigger icon portswigger

extension from my previous hacking for script kiddies repo

project-drdo icon project-drdo

Created a project based on implementing secured web services

project1 icon project1

Project 1 submission for UMN Cybersecurity Bootcamp

prowler icon prowler

Prowler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more.

puwr icon puwr

Pivot your way deeper into networks by discovering hosts & ports, using a compromised machine via SSH

python-deepweb icon python-deepweb

Short demo about how to manage TOR network agent with Python (stem)

real-time-human-authentication icon real-time-human-authentication

Smart India Hackathon 2020 DRDO problem statement: CK107. Multiple camera-based dynamic human authentication for a gate. Our solution involves multiple cameras and we authenticate humans using face, gait, pose, etc features.

red-teaming-toolkit icon red-teaming-toolkit

This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.

red-vs-blue-project icon red-vs-blue-project

I concluded this report with a imersive and very hand-on assesement where I was able to use the tactics and tools available as a Red team player giving me a better understading of how data exploitation happens and on the Blue side once the vulnerability have been identifiedvia SIEM, I was aware of the same malicious tactics, techniques and procedures in order to build response strategies around them.

redzsigint icon redzsigint

Software framework for your own SIGINT platform

regexforlog4j-jndi icon regexforlog4j-jndi

SOC analyst work day and night for protecting the organization but sometimes we don't have the mechanism for protecing against particular threat like in life in some moment we were helpless but sun shine after storm. Yup log4j, i'm not a pro in wrtting regex but have some hands-on knowledge. For now, i have seen people wrtting long regex for SIEM solution and dumb guy like thinking how you did that but long is not always right ooh sorry, Means optimal solution could be achieved in matter of few words.

response icon response

Monzo's real-time incident response and reporting tool ⚡️

riskblox icon riskblox

RiskBloX is a Risk Management open-source tool with two offerings. An ATT&CK Assessment leveraging Mitre ATT&CK resources. A Business Impact Risk Assessment (BIRA) against Risk Areas to determine the impact to the business if a risk is realised.

security icon security

🔐 Secure your cluster with TLS, numerous authentication backends, data masking, audit logging as well as role-based access control on indices, documents, and fields

security-event-analysis-automation-tool icon security-event-analysis-automation-tool

A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks including Phishing Email Analysis & Brand Monitoring to fasten the incident response.

security-policy-templates icon security-policy-templates

A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.

security-program icon security-program

This template repo is used for managing SOC2 compliance using nothing, but github.

security-study-plan icon security-study-plan

Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.