0x00ctrl / CyberSec-BooksLinks
Some useful books related to Cybersecurity, Linux and more.
☆46Updated last month
Alternatives and similar repositories for CyberSec-Books
Users that are interested in CyberSec-Books are comparing it to the libraries listed below
Sorting:
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆46Updated 2 months ago
- ☆119Updated 2 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆67Updated last month
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆48Updated last week
- ☆64Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆82Updated 2 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 7 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 4 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- This is an AD pentest tools collection☆58Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆73Updated 2 weeks ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 4 months ago
- ☆40Updated 7 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆123Updated 2 weeks ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆52Updated 3 weeks ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆122Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆121Updated 4 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆42Updated 3 months ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆27Updated 3 months ago
- ☆54Updated 6 months ago
- Web Penetration Testing Course Materials☆32Updated last year
- ☆119Updated 7 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆43Updated 2 weeks ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated 9 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆31Updated last month
- 🕵️ Email osint tool☆62Updated last year