Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance
☆52Nov 26, 2024Updated last year
Alternatives and similar repositories for Cybersecurity-Toolkit
Users that are interested in Cybersecurity-Toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆410Jun 27, 2024Updated last year
- ☆30Aug 21, 2024Updated last year
- Learning progress in CyberTalents Blue Team Scholarship 2023. Write-ups, solutions, and notes for challenges & topics. Join my cybersecur…☆25Sep 28, 2023Updated 2 years ago
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- CyberTalents Blue Team Scholarship 2023 By Trend Micro☆12Sep 28, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated 2 months ago
- ☆19Mar 9, 2022Updated 4 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆33Dec 12, 2025Updated 4 months ago
- This repository is a curated resource for aspiring bug hunters, offering hands-on labs, tools, and structured guidance to support your le…☆76Jun 17, 2025Updated 10 months ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated last year
- ☆121May 26, 2025Updated 11 months ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Aug 8, 2020Updated 5 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆49Mar 5, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Drush commands for Drupal Code Builder. Use the branch that matches the Drush version.☆13Sep 3, 2024Updated last year
- WAPTLab - Web Application Penetration Testing Lab☆97Dec 1, 2025Updated 5 months ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago
- ☆13Mar 29, 2021Updated 5 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- A free starter app for activating Ionic's Superapp SDK. Walks you through configuring and building your first superapp.☆10Nov 29, 2023Updated 2 years ago
- ☆23Jan 6, 2023Updated 3 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- تجربتي مع اختبار CEH☆29May 8, 2021Updated 4 years ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- The Drupal module for your Druxt.js backend.☆11Aug 18, 2025Updated 8 months ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- ☆18Feb 13, 2026Updated 2 months ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 10 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A javascript library for creating divs that expand to fill the screen when they are clicked on☆16Jul 18, 2017Updated 8 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- Crappy shell script that port scans using curl☆13May 3, 2017Updated 9 years ago
- Pay with payfort gateway in MENA.☆14Dec 3, 2022Updated 3 years ago
- ☆14Oct 12, 2021Updated 4 years ago
- This class can be used to validate Saudi resident identifier numbers. It takes a resident identifier number and calculates a checksum to…☆13Sep 11, 2024Updated last year