1d8 / CybersecLearningLinks
Resource Dump For Learning Cybersec-related Concepts
☆25Updated 5 years ago
Alternatives and similar repositories for CybersecLearning
Users that are interested in CybersecLearning are comparing it to the libraries listed below
Sorting:
- Guidelines for writing secure code for Python developers.☆21Updated 8 years ago
- ☆33Updated 8 months ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated last month
- Pentest ToolKit☆28Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆62Updated 9 years ago
- In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the …☆63Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Collections of way to evade normal detection events.☆25Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆11Updated 5 years ago
- ☆10Updated 3 years ago
- ☆30Updated 5 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated 2 years ago
- A small collection of OSINT data collection tools.☆17Updated 6 years ago
- Web App Pen Tester (Web Interface)☆32Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- A custom script I created because I got tired of installing my tools manually!☆13Updated 10 months ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 4 years ago
- Collection of our CTF write-ups☆29Updated 5 years ago
- Damn Vulnerable ElectronJS App (DVEA)☆14Updated last month
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆82Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆17Updated 7 years ago
- Various pentesting scripts, focusing on iOS and network security☆14Updated 5 years ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago