1d8 / CybersecLearning
Resource Dump For Learning Cybersec-related Concepts
☆24Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for CybersecLearning
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 4 years ago
- Collections of way to evade normal detection events.☆24Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆16Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆19Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Write-Ups for TryHackMe☆22Updated 3 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Yet another powerful payload encoder/decoder☆12Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- ☆34Updated 6 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- A collection of personal ZAP scripts☆13Updated last year
- Pentest ToolKit☆27Updated 4 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 5 months ago
- Hunt and Analyze Tor Onion Sites☆23Updated last year
- ☆21Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11Updated 5 years ago