Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance
☆52Nov 26, 2024Updated last year
Alternatives and similar repositories for Cybersecurity-Toolkit
Users that are interested in Cybersecurity-Toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Learning progress in CyberTalents Blue Team Scholarship 2023. Write-ups, solutions, and notes for challenges & topics. Join my cybersecur…☆25Sep 28, 2023Updated 2 years ago
- ☆12Jun 1, 2024Updated last year
- ☆11Jun 5, 2022Updated 3 years ago
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- CyberTalents Blue Team Scholarship 2023 By Trend Micro☆12Sep 28, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- This repository is a curated resource for aspiring bug hunters, offering hands-on labs, tools, and structured guidance to support your le…☆75Jun 17, 2025Updated 9 months ago
- Inventory Management System☆19Jun 27, 2024Updated last year
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 11 months ago
- ☆16Dec 30, 2023Updated 2 years ago
- Get user information of a Twitter user.☆21May 20, 2018Updated 7 years ago
- KMS VL ALL AIO☆26Jun 1, 2024Updated last year
- WAPTLab - Web Application Penetration Testing Lab☆95Dec 1, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 4 months ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- ☆23Jan 6, 2023Updated 3 years ago
- Getting Started with Camunda Cloud and the C# Client☆12Jul 21, 2020Updated 5 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- ☆112Nov 24, 2025Updated 4 months ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- NetworkAssessment: Network Compromise Assessment Tool☆93May 31, 2024Updated last year
- This firmware downgrader was not made by me. This repo is a compilation of information and software needed to downgrade to 4.31.20 for th…☆13Sep 21, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆11Oct 17, 2020Updated 5 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- Learning material for completely newcomers in the field of BOFs☆15Apr 11, 2020Updated 5 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- An AI-CyberSecurity Bot that assists security analysts in incident investigations☆40Feb 21, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆14Oct 12, 2021Updated 4 years ago
- ☆42May 20, 2021Updated 4 years ago
- A collection of custom built scripts to exploit known vulnerability chains☆25Jul 23, 2021Updated 4 years ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 5 months ago
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Jul 10, 2025Updated 8 months ago
- A modified version of Shizuku for the quest 3 [WIP]☆20Jul 8, 2024Updated last year