1d8 / CybersecLearningLinks
Resource Dump For Learning Cybersec-related Concepts
☆25Updated 5 years ago
Alternatives and similar repositories for CybersecLearning
Users that are interested in CybersecLearning are comparing it to the libraries listed below
Sorting:
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 months ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆22Updated 8 years ago
- In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the …☆64Updated 5 years ago
- ☆33Updated 11 months ago
- ☆30Updated 5 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Penetration Testing/Security Cheatsheets☆63Updated 10 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 3 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- Notes on offensive training☆16Updated 8 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- The hacker technical cheat sheet☆43Updated 6 months ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Simple Karma Attack☆68Updated 5 years ago
- The Last Web Recon Tool You'll Need☆17Updated 5 years ago
- ☆22Updated 9 years ago
- buffer overflow examples☆23Updated 8 years ago