Update DEVTools.md

This commit is contained in:
nbats 2024-05-25 06:16:43 -07:00 committed by GitHub
parent f24abcaa75
commit c5293a1250
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -868,53 +868,6 @@
***
## ▷ Cybersecurity Tools
* 🌐 **[Awesome Cyber Security](https://github.com/fabionoth/awesome-cyber-security)**, [Awesome Security](https://github.com/sbilly/awesome-security), [Rawsec's CyberSecurity Inventory](https://inventory.raw.pm/), [Cybersecurity-Resources](https://github.com/Nickyie/Cybersecurity-Resources), [Infosec Resources](https://github.com/stong/infosec-resources) or [Anon Security](https://t.me/anon_server) - Cybersecurity Resources
* 🌐 **[Awesome CI/CD Security](https://github.com/myugan/awesome-cicd-security)** - CI/CD Security Resources
* 🌐 **[Awesome Cryptography](https://github.com/sobolevn/awesome-cryptography)** - Cryptography Resources
* 🌐 **[Reverse Engineering Resources](https://github.com/wtsxDev/reverse-engineering)** - Reverse Engineering Resources
* ↪️ **[Pentesting Resources](https://www.reddit.com/r/FREEMEDIAHECKYEAH/wiki/storage#wiki_pentesting_resources)**
* ⭐ **[x64dbg](https://x64dbg.com/)** - Malware Reverse Engineering
* ⭐ **[RevShells](https://www.revshells.com/)** - Reverse Shell Generator
* [Open Source Security Software](https://open-source-security-software.net/) - Cybersecurity Software
* [Advisory Database](https://github.com/github/advisory-database), [ThreatFox](https://threatfox.abuse.ch/) or [Att&ck](https://attack.mitre.org/) - Cybersecurity Defense Databases
* [SSuite](https://spidersuite.github.io/SSuite/) - Web Security App
* [osquery](https://osquery.io) or [Nmap](https://nmap.org/) - Security Monitors
* [Canarytokens](https://canarytokens.org/generate) - Network Breach Check
* [Nuclei](https://docs.projectdiscovery.io/tools/nuclei) / [GitHub](https://github.com/projectdiscovery/nuclei) or [NVD](https://nvd.nist.gov/) - Vulnerability Tracking / Scanning
* [Zeek](https://zeek.org/), [Nmap](https://nmap.org/) / [Results](https://nmap.org/ndiff/), [Kismet](https://www.kismetwireless.net/), [ntop](https://www.ntop.org/) or [Sniffnet](https://www.sniffnet.net/) - Network Monitors
* [Crowdsec](https://crowdsec.net/) - Crowd-Sourced Intrusion Detection / Prevention / [GitHub](https://github.com/crowdsecurity/crowdsec)
* [X-Force Exchange](https://exchange.xforce.ibmcloud.com/) - Security Threat Intelligence Platform
* [ThreatMap](https://threatmap.checkpoint.com/) or [CyberMap](https://cybermap.kaspersky.com/) - Live Malware Distribution Maps
* [VirusShare](https://virusshare.com/), [PulseDive](https://pulsedive.com/) or [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - Malware Search
* [The Void](https://www.thevoid.community/) - Software Incident Reports
* [Fail2Ban](https://github.com/fail2ban/fail2ban) - Protect Servers from Brute Force Attacks
* [OpenSCA-CLI](https://github.com/XmirrorSecurity/OpenSCA-cli) - Composition Analysis for Third Party Components
* [Unblob](https://unblob.org/) - Extraction Suite
* [Security Onion Solutions](https://securityonionsolutions.com/), [Wazuh](https://wazuh.com/) or [Snyk](https://snyk.io/) / [GitHub](https://github.com/snyk/cli) - Site Security Monitor
* [Greenbone](https://github.com/greenbone) - Vulnerability Management
* [Evervault](https://evervault.com/) - Security / Compliance Infrastructure
* [HTTPToolkit](https://httptoolkit.com/) - Debug, Test & Build with HTTP(S)
* [IP Intelligence](https://getipintel.net/), [AbuseIPDB](https://www.abuseipdb.com/ ) or [Proxy Check](https://proxycheck.io/) - Proxy / VPN / Bad IP Detection
* [DarkVisitors](https://darkvisitors.com/) - Autonomous Chatbots / Data Scraper List
* [Al-Khaser](https://github.com/LordNoteworthy/al-khaser) - Anti-Malware Stress Test
* [YARA](https://virustotal.github.io/yara/) - Malware Identification Tool
* [Winitor](https://www.winitor.com/) - EXE Malware Assessment
* [HTTPLeaks](https://github.com/cure53/HTTPLeaks) - HTTP Sites Leak Information
* [Cryptography](https://pub.dev/packages/cryptography) - Dart and Flutter Cryptography Library
* [Radare](https://rada.re/r/), [Reverse Engineer's Toolkit](https://github.com/mentebinaria/retoolkit), [Rizin](https://rizin.re/), [Frida](https://frida.re/), [GHIDRA](https://ghidra-sre.org/) or [Cutter](https://cutter.re/) - Reverse Engineering
* [Flare VM](https://github.com/mandiant/flare-vm) - Reverse Engineering Environment Setup Script
* [MSTG](https://mas.owasp.org/) or [DVIA-v2](https://github.com/prateek147/DVIA-v2) - App Security Testing / Reverse Engineering
* [challenges.re](https://challenges.re/) - Reverse Engineer Code
* [CVE Details](https://www.cvedetails.com/) - CVE Details
* [ImHex](https://imhex.werwolv.net) - Hex Editor / [Web Version](https://web.imhex.werwolv.net/)
* [YASNAC](https://github.com/RikkaW/YASNAC) - SafetyNet Attestation Checker
* [AllSafe](https://github.com/t0thkr1s/allsafe) - Intentionally Vulnerable Android App
* [ClassyShark](https://github.com/google/android-classyshark) - Android/Java Bytecode Viewer
***
## ▷ Database Tools
* 🌐 **[DB Engines](https://db-engines.com/en/ranking)** - Database Rankings
@ -1465,3 +1418,55 @@
* [minitorch](https://github.com/minitorch/minitorch) - Machine Learning Engineering Course Code
* [ML-Youtube-Courses](https://github.com/dair-ai/ML-YouTube-Courses) - Machine Learning Courses on YouTube
* [Cyberbotics](https://cyberbotics.com/) - Robot Simulator
***
# ► Cybersecurity Tools
* 🌐 **[Awesome Cyber Security](https://github.com/fabionoth/awesome-cyber-security)**, [Awesome Security](https://github.com/sbilly/awesome-security), [Rawsec's CyberSecurity Inventory](https://inventory.raw.pm/), [Cybersecurity-Resources](https://github.com/Nickyie/Cybersecurity-Resources), [Infosec Resources](https://github.com/stong/infosec-resources) or [Anon Security](https://t.me/anon_server) - Cybersecurity Resources
* 🌐 **[Awesome CI/CD Security](https://github.com/myugan/awesome-cicd-security)** - CI/CD Security Resources
* 🌐 **[Awesome Cryptography](https://github.com/sobolevn/awesome-cryptography)** - Cryptography Resources
* [Open Source Security Software](https://open-source-security-software.net/) - Cybersecurity Software
* [Advisory Database](https://github.com/github/advisory-database), [ThreatFox](https://threatfox.abuse.ch/) or [Att&ck](https://attack.mitre.org/) - Cybersecurity Defense Databases
* [SSuite](https://spidersuite.github.io/SSuite/) - Web Security App
* [osquery](https://osquery.io) or [Nmap](https://nmap.org/) - Security Monitors
* [Canarytokens](https://canarytokens.org/generate) - Network Breach Check
* [Nuclei](https://docs.projectdiscovery.io/tools/nuclei) / [GitHub](https://github.com/projectdiscovery/nuclei) or [NVD](https://nvd.nist.gov/) - Vulnerability Tracking / Scanning
* [Zeek](https://zeek.org/), [Nmap](https://nmap.org/) / [Results](https://nmap.org/ndiff/), [Kismet](https://www.kismetwireless.net/), [ntop](https://www.ntop.org/) or [Sniffnet](https://www.sniffnet.net/) - Network Monitors
* [Crowdsec](https://crowdsec.net/) - Crowd-Sourced Intrusion Detection / Prevention / [GitHub](https://github.com/crowdsecurity/crowdsec)
* [X-Force Exchange](https://exchange.xforce.ibmcloud.com/) - Security Threat Intelligence Platform
* [ThreatMap](https://threatmap.checkpoint.com/) or [CyberMap](https://cybermap.kaspersky.com/) - Live Malware Distribution Maps
* [VirusShare](https://virusshare.com/), [PulseDive](https://pulsedive.com/) or [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - Malware Search
* [The Void](https://www.thevoid.community/) - Software Incident Reports
* [Fail2Ban](https://github.com/fail2ban/fail2ban) - Protect Servers from Brute Force Attacks
* [OpenSCA-CLI](https://github.com/XmirrorSecurity/OpenSCA-cli) - Composition Analysis for Third Party Components
* [Unblob](https://unblob.org/) - Extraction Suite
* [Security Onion Solutions](https://securityonionsolutions.com/), [Wazuh](https://wazuh.com/) or [Snyk](https://snyk.io/) / [GitHub](https://github.com/snyk/cli) - Site Security Monitor
* [Greenbone](https://github.com/greenbone) - Vulnerability Management
* [Evervault](https://evervault.com/) - Security / Compliance Infrastructure
* [HTTPToolkit](https://httptoolkit.com/) - Debug, Test & Build with HTTP(S)
* [IP Intelligence](https://getipintel.net/), [AbuseIPDB](https://www.abuseipdb.com/ ) or [Proxy Check](https://proxycheck.io/) - Proxy / VPN / Bad IP Detection
* [DarkVisitors](https://darkvisitors.com/) - Autonomous Chatbots / Data Scraper List
* [Al-Khaser](https://github.com/LordNoteworthy/al-khaser) - Anti-Malware Stress Test
* [YARA](https://virustotal.github.io/yara/) - Malware Identification Tool
* [Winitor](https://www.winitor.com/) - EXE Malware Assessment
* [HTTPLeaks](https://github.com/cure53/HTTPLeaks) - HTTP Sites Leak Information
* [Cryptography](https://pub.dev/packages/cryptography) - Dart and Flutter Cryptography Library
* [CVE Details](https://www.cvedetails.com/) - CVE Details
* [ImHex](https://imhex.werwolv.net) - Hex Editor / [Web Version](https://web.imhex.werwolv.net/)
* [YASNAC](https://github.com/RikkaW/YASNAC) - SafetyNet Attestation Checker
* [AllSafe](https://github.com/t0thkr1s/allsafe) - Intentionally Vulnerable Android App
* [ClassyShark](https://github.com/google/android-classyshark) - Android/Java Bytecode Viewer
***
## ▷ Reverse Engineering
* 🌐 **[Reverse Engineering Resources](https://github.com/wtsxDev/reverse-engineering)** - Reverse Engineering Resources
* ↪️ **[Pentesting Resources](https://www.reddit.com/r/FREEMEDIAHECKYEAH/wiki/storage#wiki_pentesting_resources)**
* ⭐ **[x64dbg](https://x64dbg.com/)** - Debugger for Reverse Engineering
* ⭐ **[RevShells](https://www.revshells.com/)** - Reverse Shell Generator
* [Radare](https://rada.re/r/), [Reverse Engineer's Toolkit](https://github.com/mentebinaria/retoolkit), [Rizin](https://rizin.re/), [Frida](https://frida.re/), [GHIDRA](https://ghidra-sre.org/) or [Cutter](https://cutter.re/) - Reverse Engineering
* [Flare VM](https://github.com/mandiant/flare-vm) - Reverse Engineering Environment Setup Script
* [MSTG](https://mas.owasp.org/) or [DVIA-v2](https://github.com/prateek147/DVIA-v2) - App Security Testing / Reverse Engineering
* [challenges.re](https://challenges.re/) - Reverse Engineer Code