Timothy Lee's starred repositories
openai-translator
基于 ChatGPT API 的划词翻译浏览器插件和跨平台桌面端应用 - Browser extension and cross-platform desktop application for translation based on ChatGPT API.
prowler
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
awesome-honeypots
an awesome list of honeypot resources
awesome-incident-response
A curated list of tools for incident response
ChatGPT_DAN
ChatGPT DAN, Jailbreaks prompt
decky-loader
A plugin loader for the Steam Deck.
awesome-forensics
A curated list of awesome forensic analysis tools and resources
awesome-pcaptools
A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
awesome-industrial-control-system-security
A curated list of resources related to Industrial Control System (ICS) security.
untitledgoosetool
Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments.
Awesome-AI
A curated list of awesome things related to artificial intelligence tools
CIS-Ubuntu-20.04-Ansible
Ansible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation
cis-benchmarks-audit
Simple command line tool to check for compliance against CIS Benchmarks
awesome-ics-writeups
Collection of writeups on ICS/SCADA security.
awesome-ai-security
A collection of awesome resources related AI security
Awesome-AI-for-cybersecurity
Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), application (WAF or database firewalls), user (UBA), process behavior (anti-fraud).