1d8 / CybersecLearningLinks
Resource Dump For Learning Cybersec-related Concepts
☆25Updated 5 years ago
Alternatives and similar repositories for CybersecLearning
Users that are interested in CybersecLearning are comparing it to the libraries listed below
Sorting:
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 months ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago
- Guidelines for writing secure code for Python developers.☆22Updated 8 years ago
- ☆30Updated 5 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆58Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- ☆33Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- buffer overflow examples☆23Updated 8 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- WebHook for Red Team☆25Updated 4 years ago
- recon-ng modules for Censys☆37Updated 2 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 4 months ago
- ☆10Updated 3 years ago
- A web front-end for password cracking and analytics☆16Updated 7 years ago
- Miscellaneous tools for BloodHound☆18Updated 4 years ago
- Use Tor for anonymous scanning with nmap☆90Updated 10 years ago
- Penetration Testing/Security Cheatsheets☆64Updated 10 years ago
- The hacker technical cheat sheet☆43Updated 7 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Updated 7 years ago
- ☆22Updated 9 years ago