7ORVS / Cyber-Security-Resources
This repo will contain resources in different topics in cyber security especially in reverse engineering and malware analysis, such tools, YouTube channels, blogs, courses, articles related to this field, and websites you can solve RE and MA problems on it
☆9Updated last year
Alternatives and similar repositories for Cyber-Security-Resources:
Users that are interested in Cyber-Security-Resources are comparing it to the libraries listed below
- ☆18Updated 7 months ago
- ☆13Updated 10 months ago
- ☆39Updated 3 years ago
- ☆16Updated 2 months ago
- ☆16Updated 8 months ago
- ☆29Updated 3 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated last year
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆19Updated 2 weeks ago
- Capture screenshots of onion services on an onion service.☆48Updated 10 months ago
- My Gitbook CyberSec Notes☆12Updated 2 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- ☆14Updated 3 years ago
- Misr: The Ultimate Vulnerability Scanner☆15Updated 8 months ago
- ☆30Updated 3 years ago
- A curated list featuring OSs, hacking, cybersecurity, network security, and IT-related subreddits.☆16Updated 2 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆47Updated 2 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Updated 2 years ago
- Penetration Testing Interview Questions☆36Updated 3 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆13Updated 4 months ago
- A multi web security purposes tool☆38Updated 2 months ago
- An all-in-one repository for setting up a new VM with tools for bug bounty hunting, Android app testing, browser configuration, logging, …☆13Updated 9 months ago
- ☆12Updated 4 years ago
- Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integr…☆12Updated 10 months ago
- ☆24Updated 2 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆47Updated last year
- ☆38Updated 4 months ago
- Web Hacking and Red Teaming MindMap☆72Updated 2 years ago
- New Framework Red Team Operations☆18Updated 3 years ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆20Updated 8 months ago