informationsecurity

Presenterm : Revolutionizing Terminal-Based Presentations With Markdown

presenterm lets you create presentations in markdown format and run them from your terminal, with support for image and animated…

9 months ago

JailbreakEval : Automating the Evaluation Of Language Model Security

Jailbreak is an attack that prompts a language model to give actionable responses to harmful behaviors, such as writing an…

9 months ago

HASH : Harnessing HTTP Agnostic Software Honeypots For Enhanced Cybersecurity

The main philosophy of HASH is to be easy to configure and flexible to mimic any software running on HTTP/HTTPs.…

9 months ago

SECurityTr8Ker : SEC Cybersecurity Disclosure Monitor

SECurityTr8Ker is a Python application designed to monitor the U.S. Securities and Exchange Commission's (SEC) RSS feed for new 8-K…

10 months ago

ripgrep : The Fast, Flexible Search Tool

ripgrep is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will…

10 months ago

InfluxDB : The Open Source Leader In Time Series Data And Real-Time Analytics

InfluxDB is the leading open source time series database for metrics, events, and real-time analytics. Project Status This main branch…

10 months ago

Fuxploider : Automating File Upload Vulnerability Exploitation

Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws.…

10 months ago

The Strength Of Signed App Control Policies

Before delving into the topic, let's first clarify the role of an Administrator within the operating system. An Administrator is…

10 months ago

Embassy : Revolutionizing Embedded Systems With Rust And Asynchronous Programming

Embassy is the next-generation framework for embedded applications. Write safe, correct and energy-efficient embedded code faster, using the Rust programming…

10 months ago

AttackRuleMap : Bridging Adversary Simulations And Detection Rules For Enhanced Cybersecurity

This repository provides a mapping of Atomic Red Team attack simulations to open-source detection rules, such as Sigma and Splunk…

10 months ago