Cyber Security Handbook
☆157Jul 12, 2023Updated 2 years ago
Alternatives and similar repositories for cybersecurity
Users that are interested in cybersecurity are comparing it to the libraries listed below
Sorting:
- ☆94Nov 4, 2025Updated 4 months ago
- commands☆27Nov 5, 2020Updated 5 years ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 8 months ago
- This page should help you with the recon for security issues.☆20Oct 14, 2022Updated 3 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- This repository contains Java programs to become zero to hero in Java. Programs related to each and every concep are present from easy to…☆16Mar 3, 2022Updated 4 years ago
- You can find hardcoded Api-Key,Secret,Token Etc..☆77Sep 3, 2022Updated 3 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Thecyberhub app of @th3cyb3rhub community☆11Feb 11, 2026Updated 3 weeks ago
- Magic tricks using grep, sed and awk☆26Jul 28, 2022Updated 3 years ago
- All Type of Payloads☆141Mar 26, 2024Updated last year
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆18Mar 13, 2023Updated 2 years ago
- An app based on Kernel Adiutor, MTweaks and hKTweaks for kernel management.☆10Aug 29, 2022Updated 3 years ago
- Product Ingredient Agent☆14Oct 6, 2025Updated 5 months ago
- Reflector: A tool to check for reflected query parameter values.☆12Jan 13, 2023Updated 3 years ago
- PDF slides☆246Aug 19, 2021Updated 4 years ago
- ☆26Feb 28, 2023Updated 3 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- This repository is about Learn | Hack | Share | Repeat.☆11Dec 26, 2022Updated 3 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- Zip/Unzip files/folders stored in google drive with colab☆15Sep 8, 2021Updated 4 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 2 years ago
- Tool to hack Graphql☆15Oct 17, 2023Updated 2 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- Cybersecurity Resources☆60Oct 6, 2024Updated last year
- A bash script that will automatically install Bug Hunting tools used for recon☆179Jul 6, 2023Updated 2 years ago
- ReconMaster contest - scripts used and a write-up☆89Sep 20, 2021Updated 4 years ago
- ☆10May 15, 2020Updated 5 years ago
- Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration test☆14Jul 18, 2021Updated 4 years ago
- Recon-Ninja☆86Mar 24, 2024Updated last year
- ☆101Oct 18, 2023Updated 2 years ago
- This repository is about @AnubhavSingh_'s 365 days of Learning Tweets collection.☆228Dec 31, 2022Updated 3 years ago
- Device Tree for Xiaomi Mi9T / Redmi K20 (Davinci/in)☆11Updated this week
- This is a Google drive URl shortner like program which helps you to share your google drive file with out exceeding the quota and anonymo…☆20Jan 25, 2020Updated 6 years ago
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- Tools and scripts written for personal use☆12Jan 3, 2021Updated 5 years ago
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Mar 11, 2019Updated 6 years ago