1d8 / CybersecLearning
Resource Dump For Learning Cybersec-related Concepts
☆24Updated 4 years ago
Alternatives and similar repositories for CybersecLearning:
Users that are interested in CybersecLearning are comparing it to the libraries listed below
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆19Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- fully automated c# reverse shells with automated ssh tunneling☆5Updated 3 years ago
- ☆30Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆16Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆33Updated 4 years ago
- ☆34Updated last week
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆12Updated last year
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆10Updated 5 years ago
- Pentesting-related Bash Scripts☆11Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 7 months ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Notes on offensive training☆16Updated 7 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆19Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- ☆11Updated 4 years ago