Skip to content
View ezztahoun's full-sized avatar
💭
I may be slow to respond.
💭
I may be slow to respond.

Highlights

  • Pro

Organizations

@cryspuwaterloo @ezsecorg @simorgh-project @cypientadev @ATMoS-Waterloo @PrivPkt @UW-CIA @cypienta

Block or report ezztahoun

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

One app to rule them all!

TypeScript 1,687 232 Updated Apr 22, 2025

Created with StackBlitz ⚡️

TypeScript 1 1 Updated Dec 13, 2024

Find relevant incidents, logs, events, and alerts to all of your incidents. [Attack Flows, Attack Chains, & Root Cause Discovery - NO LLMs, NO Queries, Just Explainable Machine Learning] >> Use it …

Python 74 52 Updated Apr 18, 2025
Python 2 1 Updated Aug 27, 2025
Python 14 Updated Apr 18, 2025
Python 1 Updated Jul 25, 2025

Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors in the network traffic. Stratosphere Laboratory, AIC, FEL, CV…

Python 870 203 Updated May 11, 2026

⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident response processes

Vue 527 69 Updated May 1, 2026

Kafka Connect Elasticsearch Source

Java 74 42 Updated Aug 20, 2024

Horusec is an open source tool that improves identification of vulnerabilities in your project with just one command.

Go 1,319 215 Updated May 9, 2026

CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool

Python 3,588 747 Updated Apr 28, 2026

This tool maps a file's behavior on MITRE ATT&CK matrix.

YARA 60 13 Updated Mar 4, 2020

an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques

Python 188 37 Updated May 5, 2022

Leaked Mirai Source Code for Research/IoC Development Purposes

C 9,307 3,513 Updated Oct 16, 2025

威胁狩猎

1 8 Updated Feb 19, 2019

A repository of sysmon configuration modules

PowerShell 3,033 644 Updated Aug 21, 2024

Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)

C++ 616 116 Updated Oct 29, 2025

ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.

Python 258 77 Updated Oct 9, 2020

ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python

Python 1,099 300 Updated Jan 4, 2024

Cybersecurity Evaluation Tool

TSQL 1,827 324 Updated May 13, 2026

Splunk Security Content

Python 1,625 457 Updated May 13, 2026

Transpile trained scikit-learn estimators to C, Java, JavaScript and others.

Python 1,309 169 Updated Jun 12, 2024

Quickly generate suricata rules for IOCs

Go 28 8 Updated Apr 30, 2021

A repository of curated datasets from various attacks

Python 767 134 Updated May 13, 2026

Microsoft Threat Intelligence Security Tools

Python 1,969 334 Updated May 11, 2026

A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.

Go 14,380 2,123 Updated May 13, 2026

NIST Certified SCAP 1.2 toolkit

XSLT 1,720 433 Updated May 12, 2026

Network flow analytics (Netflow, sFlow and IPFIX) with the Elastic Stack

Shell 2,516 603 Updated Mar 22, 2024

⚡ Dynamically generated stats for your github readmes

JavaScript 79,411 33,247 Updated Mar 31, 2026

Implementation of Adversarial Privacy Graph Embedding in TensorFlow

Python 21 8 Updated Jun 12, 2020
Next