A summary of the most abbreviations I encountered so far
☆28Apr 7, 2026Updated last week
Alternatives and similar repositories for Cybersecurity-Glossary
Users that are interested in Cybersecurity-Glossary are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- From Zero To Hero☆38Jul 17, 2025Updated 9 months ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- ☆15Jun 27, 2024Updated last year
- Curated list of Cyber Security acronyms & abbreviations☆43Apr 10, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆42Updated this week
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 10 months ago
- Practice CTI Quiz☆13Mar 20, 2024Updated 2 years ago
- Load ssp dll golang implementation☆19Jan 18, 2022Updated 4 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated last year
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆35Oct 15, 2025Updated 6 months ago
- Mythic Developer Series: Workshop Golang Agent☆24Jun 27, 2023Updated 2 years ago
- ☆40Jan 7, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Material i gathered for the Offensive Security Certified Professional OSCP☆14Jan 15, 2019Updated 7 years ago
- List of OSINT Capture The Flag platforms☆54Mar 27, 2026Updated 3 weeks ago
- This is a Cheatsheet for eJPT.☆16Jan 26, 2021Updated 5 years ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- ☆23Jan 18, 2024Updated 2 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- Certipy in Docker☆13Mar 28, 2024Updated 2 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆15Oct 22, 2025Updated 5 months ago
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆13May 10, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- My little precious collection of Linux 4.x kernel rootkits☆29Jul 27, 2024Updated last year
- ☆59Dec 10, 2025Updated 4 months ago
- 精简版搜集工具☆15Sep 4, 2024Updated last year
- Get newest public disclosed HackerOne report notifications on your Desktop☆15Jan 29, 2020Updated 6 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 10 years ago
- Publicly accessible version of the FiGHT website.☆17Nov 14, 2025Updated 5 months ago
- This Repository Contains mostly used CMD Commands.☆29Oct 1, 2025Updated 6 months ago
- OSCP tools and notes☆40Jan 21, 2019Updated 7 years ago
- 一款打供应商必备的代码获取工具☆19Mar 26, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit☆26Dec 29, 2023Updated 2 years ago
- Collection of over 9000 xss payloads | heavy xss collection☆13Dec 6, 2022Updated 3 years ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 9 months ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Jun 30, 2025Updated 9 months ago
- Threat Hunting queries of multiple platforms☆63Feb 26, 2026Updated last month