1d8 / CybersecLearning
Resource Dump For Learning Cybersec-related Concepts
☆24Updated 4 years ago
Alternatives and similar repositories for CybersecLearning:
Users that are interested in CybersecLearning are comparing it to the libraries listed below
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago
- Explanation of All the Payloads Used in Pentester Academy's JS for Pentester Course☆15Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Create Password lists for cracking lyrical passwords☆14Updated 10 months ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- ☆30Updated 4 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆10Updated 5 years ago
- ☆34Updated 2 months ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- ☆11Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 5 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆13Updated 3 years ago
- ☆9Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- recon-ng modules for Censys☆37Updated last year
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- fully automated c# reverse shells with automated ssh tunneling☆5Updated 4 years ago
- a collection of bash script and python to automate ZAP Security Tests☆11Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- ☆21Updated last year
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- buffer overflow examples☆22Updated 7 years ago