Ahmed ElSheikh (elsheikh21)

elsheikh21

Geek Repo

Location:Italy

Home Page:elsheikh21.github.io

Github PK Tool:Github PK Tool

Ahmed ElSheikh's starred repositories

SecLists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

ghidra

Ghidra is a software reverse engineering (SRE) framework

Language:JavaLicense:Apache-2.0Stargazers:50864Issues:1030Issues:4848

pi-hole

A black hole for Internet advertisements

Language:ShellLicense:NOASSERTIONStargazers:48638Issues:707Issues:2849

jsoncrack.com

✨ Innovative and open-source visualization application that transforms various data formats, such as JSON, YAML, XML, CSV and more, into interactive graphs.

Language:TypeScriptLicense:NOASSERTIONStargazers:30556Issues:143Issues:220

yara

The pattern matching swiss knife

Language:CLicense:BSD-3-ClauseStargazers:8175Issues:317Issues:1063

ntopng

Web-based Traffic and Security Network Traffic Monitoring

Language:LuaLicense:GPL-3.0Stargazers:6201Issues:155Issues:8049

MISP

MISP (core software) - Open Source Threat Intelligence and Sharing Platform

Language:PHPLicense:AGPL-3.0Stargazers:5288Issues:274Issues:6536

capa

The FLARE team's open-source tool to identify capabilities in executable files.

Language:PythonLicense:Apache-2.0Stargazers:4130Issues:83Issues:985

Awesome-Cybersecurity-Handbooks

A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.

License:GPL-3.0Stargazers:2259Issues:37Issues:0

pyshark

Python wrapper for tshark, allowing python packet parsing using wireshark dissectors

Language:PythonLicense:MITStargazers:2211Issues:77Issues:507

zui

Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.

Language:TypeScriptLicense:NOASSERTIONStargazers:1787Issues:29Issues:1044

nym

Nym provides strong network-level privacy against sophisticated end-to-end attackers, and anonymous transactions using blinded, re-randomizable, decentralized credentials.

dpkt

fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols

Language:PythonLicense:NOASSERTIONStargazers:1088Issues:51Issues:380

artifacts

Digital Forensics artifact repository

Language:PythonLicense:Apache-2.0Stargazers:1043Issues:74Issues:98

Manalyze

A static analyzer for PE executables.

Language:YARALicense:GPL-3.0Stargazers:1010Issues:64Issues:47

ember

Elastic Malware Benchmark for Empowering Researchers

Language:Jupyter NotebookLicense:NOASSERTIONStargazers:934Issues:51Issues:86

CICFlowMeter

CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has been used in many Cybersecurity datsets such as Android Adware-General Malware dataset (CICAAGM2017), IPS/IDS dataset (CICIDS2017), Android Malware dataset (CICAndMal2017) and Distributed Denial of Service (CICDDoS2019).

Language:JavaLicense:NOASSERTIONStargazers:529Issues:14Issues:140

amazon-alert

Track prices on Amazon and receive email alerts for price drops

hardening

DevSec Examples

Language:RubyLicense:Apache-2.0Stargazers:320Issues:39Issues:6

mlsec

PhD/MSc course on Machine Learning Security (Univ. Cagliari)

Language:Jupyter NotebookStargazers:193Issues:10Issues:0

cyber-security

Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities

Language:Jupyter NotebookStargazers:185Issues:6Issues:1

secml

A Python library for Secure and Explainable Machine Learning

Language:Jupyter NotebookLicense:Apache-2.0Stargazers:145Issues:5Issues:16

Awesome-AI-for-cybersecurity

Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), application (WAF or database firewalls), user (UBA), process behavior (anti-fraud).

MalConv-keras

This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adversarial sample crafting.

Language:PythonLicense:MITStargazers:79Issues:6Issues:7

sec-ml

security machine learning

asyncwhois

Python WHOIS and RDAP utility for querying and parsing information about Domains, IPv4s, IPv6s, and AS numbers

Language:PythonLicense:MITStargazers:61Issues:4Issues:25

PE-Explorer

PE Explorer in C++ (x86 / x64) - PE file parser, retrieve exports and imports

Language:C++License:GPL-3.0Stargazers:58Issues:4Issues:2

pypi_malware

PyPI malware packages

Language:PythonLicense:UnlicenseStargazers:57Issues:5Issues:0

AI_Cybersecurity_IDS_PoC

Winning Contribution of Michael Schwabe and David Lassig to BWI Data Analytics Hackathon 2020 in the Category Cyber Security. Proof of Concept Intrusion Detection using Zeek with selfmade MachineLearning in a nice WebApp.

Language:Jupyter NotebookStargazers:8Issues:2Issues:4

AI-in-Cybersecurity

Programs worked on in university course for Artificial Intelligence in the scope of Cybersecurity. Specifically, homework problems and challenges.

Language:Jupyter NotebookStargazers:4Issues:2Issues:0